Static task
static1
Behavioral task
behavioral1
Sample
2e41f0577b333251a5cadcaf48fe3f0a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2e41f0577b333251a5cadcaf48fe3f0a_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2e41f0577b333251a5cadcaf48fe3f0a_JaffaCakes118
-
Size
360KB
-
MD5
2e41f0577b333251a5cadcaf48fe3f0a
-
SHA1
6b41143a3d828a34b3854e0ebd10412acb29bb67
-
SHA256
78037479490daffbf3a7a49c3ec56779f2bd40933b8c40e9df75a3210ca12450
-
SHA512
22ccdf370e14fe51c42d9db19381fef96ba0e5f0f78edc31306a68ea9dbce9306bfd26a9f0414f9db7d86cf0e7347056e8f103a5ae8306ca8a5b822decc3d94a
-
SSDEEP
6144:jaBTIOkXvIngaSr5hTZd9VH7x3KjTdGG0U5zhfMy7B7:0MOkmgaSr5TRN3KjTzzhflZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e41f0577b333251a5cadcaf48fe3f0a_JaffaCakes118
Files
-
2e41f0577b333251a5cadcaf48fe3f0a_JaffaCakes118.exe windows:4 windows x86 arch:x86
9255dcb4052a760f0928d793db9cf03d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
SetLastError
QueueUserAPC
GetBinaryTypeA
WriteConsoleW
lstrcpynW
VirtualProtect
GetNumberOfConsoleInputEvents
GetLocaleInfoA
TerminateProcess
ReadConsoleA
HeapSize
HeapAlloc
GetCommConfig
IsDBCSLeadByte
LoadResource
lstrcatW
GetFileAttributesExA
GetConsoleMode
CreateWaitableTimerA
GetProcessVersion
CreateProcessA
SetConsoleWindowInfo
SetFileTime
GetACP
DefineDosDeviceW
HeapDestroy
ConvertDefaultLocale
CopyFileW
GetLocaleInfoW
OutputDebugStringW
FindFirstFileExW
MoveFileA
CreateFileW
WaitNamedPipeW
GetStringTypeW
SetFileAttributesW
GetConsoleTitleA
IsBadStringPtrA
FileTimeToDosDateTime
CreateEventA
SetCommState
AddAtomA
IsProcessorFeaturePresent
ExitProcess
WritePrivateProfileStructA
FindResourceW
VirtualUnlock
FindClose
LocalSize
GetStringTypeExA
FreeResource
GetFullPathNameW
GetPrivateProfileStringA
GetPrivateProfileSectionW
GetExitCodeThread
_lwrite
FreeConsole
GetPrivateProfileStructA
GetVersion
GlobalMemoryStatus
WriteFileGather
GetVersionExA
GetModuleHandleA
GetCommProperties
GetLargestConsoleWindowSize
ReadFileScatter
ReadConsoleOutputA
_llseek
lstrcpyA
FlushConsoleInputBuffer
GetLogicalDrives
GetStartupInfoA
TlsAlloc
SetCommMask
GetDriveTypeW
WritePrivateProfileStringA
GlobalGetAtomNameA
Sleep
ReadConsoleOutputW
GetLogicalDriveStringsW
GetComputerNameA
GetModuleHandleW
FindFirstFileA
GetShortPathNameW
GlobalGetAtomNameW
SetHandleInformation
DeleteFileA
GlobalFindAtomW
GlobalFindAtomA
SetTimeZoneInformation
SetFileAttributesA
SetTapeParameters
OpenEventW
SetConsoleScreenBufferSize
CompareFileTime
OpenSemaphoreA
VirtualLock
InterlockedDecrement
GetPrivateProfileSectionNamesA
GetTimeFormatA
TryEnterCriticalSection
OpenSemaphoreW
WriteConsoleOutputCharacterA
CreateDirectoryA
CallNamedPipeA
WaitNamedPipeA
WaitForMultipleObjects
BeginUpdateResourceA
user32
RegisterDeviceNotificationW
LoadBitmapW
FindWindowExW
MsgWaitForMultipleObjects
UnhookWinEvent
DialogBoxIndirectParamA
GetSystemMetrics
CharPrevA
MapVirtualKeyA
NotifyWinEvent
UnhookWindowsHook
CharPrevW
BeginDeferWindowPos
ArrangeIconicWindows
CharToOemBuffA
RegisterHotKey
ClientToScreen
PeekMessageA
GetMenuStringW
RegisterWindowMessageW
EnumDisplayDevicesW
WindowFromDC
LoadIconA
EnumDesktopWindows
IsCharLowerW
DrawAnimatedRects
SetThreadDesktop
LoadIconW
DefWindowProcW
GetScrollPos
gdi32
CreateBitmap
SetBrushOrgEx
CreateHalftonePalette
GetStretchBltMode
PolyBezier
GetRegionData
CreateEllipticRgnIndirect
SaveDC
Pie
CreateDIBitmap
GdiFlush
PolyPolyline
EndPage
Arc
ExtCreateRegion
GetEnhMetaFileBits
AddFontResourceW
GetCharWidth32A
GetOutlineTextMetricsA
GetTextExtentPoint32A
comdlg32
GetFileTitleW
ReplaceTextW
FindTextW
advapi32
GetSecurityDescriptorGroup
SetSecurityInfo
RegEnumValueA
GetSecurityDescriptorSacl
CryptVerifySignatureW
AccessCheckAndAuditAlarmW
AllocateLocallyUniqueId
SetNamedSecurityInfoA
CryptSignHashW
OpenProcessToken
CloseEventLog
OpenSCManagerW
GetNamedSecurityInfoA
QueryServiceObjectSecurity
CryptAcquireContextA
RegisterServiceCtrlHandlerA
RegFlushKey
SetEntriesInAclW
GetAclInformation
AllocateAndInitializeSid
shell32
ExtractIconExW
ExtractIconW
ExtractAssociatedIconW
SHFileOperationW
FindExecutableW
FindExecutableA
ole32
StgCreateDocfile
StgOpenStorage
CLSIDFromString
ReadClassStm
oleaut32
VariantChangeType
SafeArrayAccessData
comctl32
PropertySheetW
shlwapi
PathUndecorateW
StrCpyW
SHStrDupW
PathSkipRootW
ChrCmpIW
setupapi
SetupDiEnumDeviceInterfaces
SetupDiSetClassInstallParamsA
SetupOpenInfFileW
SetupDiGetDeviceInstanceIdW
SetupDiClassNameFromGuidW
SetupDiBuildDriverInfoList
SetupLogErrorA
SetupDiGetDeviceInfoListDetailA
msvcrt
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_except_handler3
__set_app_type
_controlfp
__p__fmode
Sections
.text Size: 308KB - Virtual size: 306KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE