Static task
static1
Behavioral task
behavioral1
Sample
2a64ba4d5ea6698e230d98a2087b4b26_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a64ba4d5ea6698e230d98a2087b4b26_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2a64ba4d5ea6698e230d98a2087b4b26_JaffaCakes118
-
Size
324KB
-
MD5
2a64ba4d5ea6698e230d98a2087b4b26
-
SHA1
1748d203ec227f51e7358703b28d945d76c57f73
-
SHA256
3ad8edde334171fa298dbd4dfb795f68d95cb8e6271929fd009efc704025c7ab
-
SHA512
25b134f9963fbfa712b1d633beafa3c01a49b9b741fa9ce2979f2454817609c1c8ef2c468f8a5e1583af820a2afd45de81cf0440c244afaef9a629ff45fa6d24
-
SSDEEP
6144:/1FlyB0iwAnzsUHuUIJFr39RO5WySDxrmt6TEA/Mo0yhga+deYM0:/1Fl40i1nzhDwB9RQWrpTHMo0wl+de10
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a64ba4d5ea6698e230d98a2087b4b26_JaffaCakes118
Files
-
2a64ba4d5ea6698e230d98a2087b4b26_JaffaCakes118.exe windows:4 windows x86 arch:x86
299e9b24a6db0f96d6a9c6dd2bde5457
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CompareStringA
UnhandledExceptionFilter
MoveFileExA
GetSystemInfo
WritePrivateProfileSectionA
CreateNamedPipeW
TryEnterCriticalSection
FileTimeToLocalFileTime
RaiseException
GetACP
ReleaseMutex
LocalLock
GetFileAttributesA
GlobalFlags
SearchPathW
GlobalAddAtomA
DeleteFiber
OpenFile
GlobalFindAtomW
SetConsoleWindowInfo
IsValidLocale
AreFileApisANSI
GlobalAddAtomW
IsProcessorFeaturePresent
CreateDirectoryA
LocalAlloc
_lread
GetThreadPriority
EnumCalendarInfoA
GetUserDefaultLCID
DosDateTimeToFileTime
FreeResource
GetFileAttributesExA
SetEndOfFile
SizeofResource
TlsGetValue
GetModuleFileNameW
GetFileType
GetDriveTypeA
GetCommandLineW
GetDateFormatA
CreateDirectoryW
SetThreadLocale
QueryDosDeviceA
SetConsoleTitleA
GetAtomNameA
SetCurrentDirectoryA
WritePrivateProfileStringA
lstrcmpiW
EnumSystemCodePagesW
SetErrorMode
GetShortPathNameA
CreateProcessA
FreeLibraryAndExitThread
OpenMutexA
ReadConsoleA
UnmapViewOfFile
GetVersion
GetTickCount
WritePrivateProfileStructA
GlobalDeleteAtom
GetLogicalDriveStringsA
LCMapStringA
SetMailslotInfo
GetCompressedFileSizeW
SetThreadPriorityBoost
PeekNamedPipe
ReadFile
IsBadWritePtr
EnumResourceLanguagesW
SetFileAttributesA
GetCommandLineA
GetVersionExA
VirtualProtect
GetSystemTimeAsFileTime
ExitProcess
user32
AppendMenuA
RegisterClipboardFormatA
PostQuitMessage
InvertRect
DefDlgProcA
GetWindowLongW
IsClipboardFormatAvailable
GetWindowTextW
ChangeDisplaySettingsW
GetDC
BeginPaint
EqualRect
SetKeyboardState
CopyAcceleratorTableW
ModifyMenuW
CreateIconFromResource
SetMenu
GetWindowContextHelpId
GetDCEx
DefMDIChildProcA
DrawTextW
SetThreadDesktop
GetClassInfoExW
RegisterHotKey
SetFocus
CopyRect
RegisterClassW
EnumDisplaySettingsExA
IsDialogMessageA
BeginDeferWindowPos
CreateDialogParamW
RegisterWindowMessageA
SetCursor
SetRectEmpty
SendMessageW
GetScrollRange
ToAscii
SetProcessWindowStation
GetCaretBlinkTime
ExcludeUpdateRgn
GetWindowTextLengthA
SetDlgItemInt
CharUpperBuffW
UnhookWindowsHookEx
CheckRadioButton
GetMenuItemInfoW
DrawFrameControl
CharUpperA
BroadcastSystemMessageA
GetPropW
GetTabbedTextExtentA
GetSubMenu
LoadAcceleratorsW
DefMDIChildProcW
CharLowerBuffA
LoadAcceleratorsA
CharLowerW
SetCapture
CharToOemBuffA
GetWindowThreadProcessId
gdi32
MoveToEx
CopyMetaFileA
GetFontData
CreateICA
comdlg32
PrintDlgA
GetSaveFileNameW
advapi32
RegQueryValueW
CryptGetKeyParam
ObjectCloseAuditAlarmA
RegEnumValueW
RegConnectRegistryA
GetAclInformation
RegCreateKeyW
SetSecurityDescriptorDacl
RegSaveKeyW
OpenProcessToken
SetFileSecurityW
AllocateLocallyUniqueId
ObjectCloseAuditAlarmW
RegRestoreKeyW
CloseEventLog
GetSidSubAuthority
DuplicateTokenEx
GetSecurityDescriptorLength
DeleteAce
LookupAccountNameW
ImpersonateNamedPipeClient
EnumDependentServicesW
InitiateSystemShutdownW
RegOpenKeyW
GetSidSubAuthorityCount
SetKernelObjectSecurity
CreatePrivateObjectSecurity
LookupPrivilegeDisplayNameA
OpenServiceA
SetServiceObjectSecurity
CloseServiceHandle
GetUserNameW
CreateProcessAsUserW
GetServiceDisplayNameA
CryptGenRandom
InitializeAcl
shell32
ExtractIconExW
ShellExecuteA
SHLoadInProc
ole32
OleSave
OleSetContainedObject
oleaut32
SafeArrayCreate
SafeArrayGetLBound
SysFreeString
SysAllocStringLen
SafeArrayUnaccessData
setupapi
SetupLogErrorW
SetupInstallFromInfSectionW
SetupGetLineTextA
SetupDiSetSelectedDevice
SetupDiCreateDeviceInfoA
SetupScanFileQueueA
SetupDiEnumDeviceInterfaces
SetupFindFirstLineA
Sections
.text Size: 308KB - Virtual size: 305KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE