Static task
static1
Behavioral task
behavioral1
Sample
2e34b81e46dedaae29f0923807fd1da6_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2e34b81e46dedaae29f0923807fd1da6_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2e34b81e46dedaae29f0923807fd1da6_JaffaCakes118
-
Size
40KB
-
MD5
2e34b81e46dedaae29f0923807fd1da6
-
SHA1
f7e7bc40c93522feb4727497126713b3582ae4ea
-
SHA256
a100be18cf34107c5efc99ffb748d299f4b93b8a91b5225dfbfa60b511dc28e9
-
SHA512
abda25220f2beab02c7c2d1b569ded85ac0cde2c87e9ddc8dc1680b146a56e963737383d545c40d754025a84861a9225058910aa08405bdbf9cb6fa99082758f
-
SSDEEP
768:s+wT6bkyubYxzyiKd0kubXZ/M4mLsFRg6Yenq:qwktYxzTKd0k2X5MRy8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e34b81e46dedaae29f0923807fd1da6_JaffaCakes118
Files
-
2e34b81e46dedaae29f0923807fd1da6_JaffaCakes118.exe windows:4 windows x86 arch:x86
9de14f3a4e0716c1d3ab5c65bc8589a0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
mfc42
ord5216
ord535
ord6930
ord537
ord941
ord858
ord4129
ord5683
ord6928
ord4277
ord940
ord801
ord6283
ord6282
ord6143
ord541
ord540
ord2818
ord354
ord823
ord6883
ord825
ord665
ord3790
ord860
ord5861
ord1247
ord2820
ord3811
ord1575
ord4202
ord6877
ord1105
ord837
ord3810
ord920
ord800
msvcrt
memset
__CxxFrameHandler
strcpy
atol
strcmp
sprintf
_splitpath
_ftol
memcpy
free
malloc
realloc
_stricmp
memcmp
_except_handler3
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
_controlfp
__set_app_type
__p__fmode
__p__commode
__getmainargs
__setusermatherr
_initterm
_adjust_fdiv
kernel32
GetStartupInfoA
lstrcatA
lstrcpyA
InitializeCriticalSection
IsDBCSLeadByte
lstrcpynA
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
WideCharToMultiByte
GetModuleHandleA
GetShortPathNameA
MultiByteToWideChar
lstrlenW
GetCommandLineA
lstrcmpiA
WaitForSingleObject
lstrlenA
SetLastError
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetLastError
MoveFileExA
DeleteFileA
GetCurrentThreadId
GetTickCount
WinExec
CreateProcessA
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
GetModuleFileNameA
GetSystemDirectoryA
GetTempPathA
Sleep
user32
TranslateMessage
GetMessageA
KillTimer
PostThreadMessageA
SetTimer
CharNextA
LoadStringA
DispatchMessageA
advapi32
RegDeleteKeyA
RegEnumValueA
RegQueryInfoKeyA
RegEnumKeyExA
OpenServiceA
ControlService
QueryServiceStatus
DeleteService
OpenSCManagerA
CreateServiceA
ChangeServiceConfig2A
CloseServiceHandle
RegisterServiceCtrlHandlerA
SetServiceStatus
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegDeleteValueA
StartServiceCtrlDispatcherA
RegOpenKeyExA
RegCreateKeyExA
ole32
CoRevokeClassObject
CoCreateInstance
CoRegisterClassObject
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
CoInitializeEx
CoInitialize
oleaut32
SysFreeString
SysAllocString
RegisterTypeLi
VarUI4FromStr
LoadTypeLi
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ