Static task
static1
Behavioral task
behavioral1
Sample
2e29a843be1831e1283668ca033b6216_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2e29a843be1831e1283668ca033b6216_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2e29a843be1831e1283668ca033b6216_JaffaCakes118
-
Size
301KB
-
MD5
2e29a843be1831e1283668ca033b6216
-
SHA1
84e76699ed81f6a2076bddd83e16b10e44d9ae7c
-
SHA256
b74e1b7f07fe65ff52dbb9a7514c8a0b230defb0ad364ebcbe06fd9750812931
-
SHA512
0576e9b4c96e7781000cafb2363a6279d19ceba5870f6a95ed9d29a52e67eb33767c773cbd344e5864e98e18a5ef3e94c877a12d0f02b69635112f3f7b4bf452
-
SSDEEP
6144:1HUYLbZp+BRs/Jb9tAoVXjUWH8lVSjQ4yhxplAVYTm5:6YL7CRsvH8oQnGem5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e29a843be1831e1283668ca033b6216_JaffaCakes118
Files
-
2e29a843be1831e1283668ca033b6216_JaffaCakes118.exe windows:4 windows x86 arch:x86
aa242364ef60225c96ddd3c21ec7eb05
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
GopherFindFirstFileW
SetUrlCacheEntryInfoW
InternetGoOnline
InternetGetCertByURL
FindNextUrlCacheEntryW
InternetShowSecurityInfoByURLW
FindNextUrlCacheContainerW
InternetWriteFileExA
FindNextUrlCacheEntryExW
FtpCommandW
FtpOpenFileW
FtpCreateDirectoryW
InternetShowSecurityInfoByURL
InternetOpenUrlW
InternetGetCookieA
InternetConfirmZoneCrossing
InternetConfirmZoneCrossingA
user32
GetWindow
GetClipboardSequenceNumber
MessageBoxA
CharToOemBuffW
GetProcessWindowStation
SetMenu
FlashWindow
UnpackDDElParam
LoadMenuA
MapVirtualKeyW
DialogBoxParamA
GetPropA
VkKeyScanExW
GetWindowLongA
CheckDlgButton
GetMessageA
DdeQueryConvInfo
DrawCaption
ChildWindowFromPoint
EnumWindowStationsW
DestroyCaret
MsgWaitForMultipleObjects
GetWindowContextHelpId
ModifyMenuW
comdlg32
GetOpenFileNameW
ChooseColorA
ChooseFontA
PrintDlgW
shell32
SheChangeDirExW
ExtractAssociatedIconW
SHGetNewLinkInfo
SHGetDesktopFolder
SHGetPathFromIDListA
SHFileOperation
RealShellExecuteW
SHGetPathFromIDList
SHQueryRecycleBinA
RealShellExecuteExA
ShellAboutW
DragFinish
FreeIconList
kernel32
LCMapStringW
GetShortPathNameA
GetStringTypeA
WriteFile
CompareStringA
UnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleA
GetCurrentThreadId
GetModuleFileNameW
GetCurrentProcessId
DeleteCriticalSection
IsValidLocale
Sleep
GetFileType
EnumSystemLocalesA
VirtualFree
GetProcAddress
GetLocaleInfoA
GetCurrentProcess
HeapCreate
GetStringTypeW
SetLastError
GetEnvironmentVariableA
GetEnvironmentStringsW
IsValidCodePage
GetCurrentThread
InitializeCriticalSection
TerminateProcess
HeapDestroy
SetEnvironmentVariableA
SetConsoleCtrlHandler
GetSystemTimeAsFileTime
MultiByteToWideChar
GetTickCount
GetEnvironmentStrings
GetStdHandle
GetTimeFormatA
FreeEnvironmentStringsW
FreeLibrary
InterlockedDecrement
EnterCriticalSection
HeapReAlloc
TlsSetValue
GetStartupInfoW
GetStartupInfoA
GetLastError
SetUnhandledExceptionFilter
CompareStringW
GetCPInfo
LoadLibraryA
QueryPerformanceCounter
TlsGetValue
GetProcessHeap
GetOEMCP
WideCharToMultiByte
GlobalFindAtomA
GetVersionExA
GetUserDefaultLCID
GetLocaleInfoW
FreeEnvironmentStringsA
GetPrivateProfileIntW
GetCommandLineW
ExitProcess
HeapSize
InterlockedIncrement
VirtualQuery
HeapAlloc
GetACP
VirtualAlloc
InterlockedExchange
HeapFree
GetTimeZoneInformation
GetVersion
GetNamedPipeInfo
GetModuleFileNameA
RtlUnwind
TlsFree
GetCommandLineA
TlsAlloc
LeaveCriticalSection
SetHandleCount
GetDateFormatA
LCMapStringA
gdi32
GetCharABCWidthsFloatW
GetBoundsRect
GetTextCharsetInfo
SetTextColor
EnumICMProfilesW
GetStockObject
RemoveFontResourceW
PatBlt
GetEnhMetaFilePaletteEntries
CreatePalette
PolyTextOutA
CreateMetaFileA
EndPage
SetColorAdjustment
Sections
.text Size: 147KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 141KB - Virtual size: 153KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ