Static task
static1
Behavioral task
behavioral1
Sample
2e1e1f1b203c8607bd4b372ae7296018_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2e1e1f1b203c8607bd4b372ae7296018_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2e1e1f1b203c8607bd4b372ae7296018_JaffaCakes118
-
Size
53KB
-
MD5
2e1e1f1b203c8607bd4b372ae7296018
-
SHA1
642948e16d150d4bb5feef5b09d2144edf517e3f
-
SHA256
08025fb938c8b0f29527c1658f46aceed080b31277632f10e84db68cf28c129d
-
SHA512
4bcef62aa0fe162c2f00da07e0d868497fa391407b0aa019a7a532d9216c4f6d1758636e1e01bed99ddc85f6cb3f4fa5d66a2da36acc71c979c91fb33e87e34a
-
SSDEEP
1536:y+Z+Gq11BsftmLRuYf9DhmyMiXmtwcAvXKqD:y2qMmYcg9iXmCcAvXKY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e1e1f1b203c8607bd4b372ae7296018_JaffaCakes118
Files
-
2e1e1f1b203c8607bd4b372ae7296018_JaffaCakes118.exe windows:5 windows x86 arch:x86
3deadc5dc423d26fa599e341d8b1f736
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetProcessWindowStation
GetIconInfo
MsgWaitForMultipleObjects
CharLowerBuffA
GetWindowThreadProcessId
EndDialog
FindWindowExW
GetKeyboardState
ToUnicode
DispatchMessageW
PeekMessageA
GetWindowLongW
GetCursorPos
GetDlgItem
GetClipboardData
SetThreadDesktop
GetForegroundWindow
GetMessageA
CloseWindowStation
PeekMessageW
CloseDesktop
GetMessageW
GetClassNameW
OpenDesktopA
ExitWindowsEx
OpenWindowStationA
DrawIcon
GetDlgItemTextW
SendMessageW
LoadCursorW
GetKeyState
GetWindowTextW
GetDlgItemTextA
kernel32
SetLastError
FindNextFileW
EnterCriticalSection
GetLogicalDrives
GetModuleFileNameW
GetLocalTime
CopyFileW
UnmapViewOfFile
GetModuleHandleA
CreateDirectoryW
MapViewOfFile
FindResourceW
lstrcatW
ReleaseMutex
GetThreadPriority
FindClose
OpenProcess
GetVersionExW
GetCommandLineA
WriteProcessMemory
lstrcpyW
GetFileSizeEx
GetSystemTimeAsFileTime
HeapFree
GetUserDefaultUILanguage
LeaveCriticalSection
lstrcpyA
WaitForSingleObject
CreateFileW
WriteFile
DeleteFileW
GetCurrentThreadId
ReadFile
FindFirstFileW
GetModuleFileNameA
CreateEventW
lstrlenA
lstrcmpiA
ResetEvent
OpenMutexW
GetFileSize
lstrcatA
SetFilePointer
CreateMutexW
GetSystemTime
SystemTimeToFileTime
Sleep
DisconnectNamedPipe
GetProcessTimes
GetDriveTypeW
IsBadReadPtr
GetExitCodeProcess
GetTickCount
GetCurrentProcessId
SetThreadPriority
MoveFileExW
MultiByteToWideChar
HeapReAlloc
Sections
.mrutmp Size: 18KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rel Size: 5KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jonml Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.slsjyx Size: 26KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ