Static task
static1
Behavioral task
behavioral1
Sample
2e3288c3f9b98547482553c993c3a441_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2e3288c3f9b98547482553c993c3a441_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2e3288c3f9b98547482553c993c3a441_JaffaCakes118
-
Size
129KB
-
MD5
2e3288c3f9b98547482553c993c3a441
-
SHA1
30ba26e8969e874d2cc0a584dd5166cea1901761
-
SHA256
dafaae906536b91efcad8ed120b801294f17d7d64969cc5a31eb6eced2e7c337
-
SHA512
9db153fad8699eb3a16a61df62845a031e281c8b4e6040a2e90140dca38ad6fe2f2942a43b58143a305bd2bbe4861912e7b84fea0c1dd6c876088bafae08abe0
-
SSDEEP
3072:+6ZKiUqERNpJ3A0dJHPMEuc/uLv/VPph8U8HfQAsVw:+6ZnAXV5PUF2up8Xs6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e3288c3f9b98547482553c993c3a441_JaffaCakes118
Files
-
2e3288c3f9b98547482553c993c3a441_JaffaCakes118.exe windows:5 windows x86 arch:x86
48172ee8ac8e3eff852b1d87ed35676a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetModuleFileNameExA
kernel32
SetFilePointer
ExitProcess
GetProcAddress
GetModuleHandleA
GetCurrentProcess
GetLastError
FindResourceExA
LockResource
LoadResource
FindResourceA
WaitForSingleObject
CreateThread
SetLastError
LoadLibraryA
IsBadReadPtr
VirtualProtect
VirtualAlloc
HeapAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapFree
EncodePointer
DecodePointer
RaiseException
IsProcessorFeaturePresent
CloseHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
ReadFile
GetModuleHandleW
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
RtlUnwind
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
HeapSize
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LoadLibraryW
CreateFileA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
WriteConsoleW
SetEndOfFile
GetProcessHeap
LCMapStringW
GetStringTypeW
CreateFileW
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ