Static task
static1
Behavioral task
behavioral1
Sample
2a5dd37a9ab1b004bb3a041fe64ee583_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2a5dd37a9ab1b004bb3a041fe64ee583_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2a5dd37a9ab1b004bb3a041fe64ee583_JaffaCakes118
-
Size
837KB
-
MD5
2a5dd37a9ab1b004bb3a041fe64ee583
-
SHA1
bd88152ba45463f901427492963dbd4a8e34f217
-
SHA256
93436cd4605a1cfac7d9ea1d467b98612ab6501c30d72736baecfc50ee72b256
-
SHA512
4d3ca3aed8e1de26dc92dde6ec2153e2fc8efcbe7bc136ecc950e9e61f6b099df211d06f4307dfc1ce3782aca0b19a1e3ba56374a986dcb344888be6c63830d1
-
SSDEEP
24576:NWWHjWMyIekBnTVsDeC9A2aC3cGMpsNYBZie3C:od0xVsDJ9AuxxNe3C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a5dd37a9ab1b004bb3a041fe64ee583_JaffaCakes118
Files
-
2a5dd37a9ab1b004bb3a041fe64ee583_JaffaCakes118.exe windows:4 windows x86 arch:x86
27b9f86be0b201a2da4252ec9eeaa123
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExA
RegCreateKeyExA
user32
PostQuitMessage
SetWindowPos
IsWindow
DispatchMessageA
EndPaint
PeekMessageA
GetDC
GetCursorPos
ReleaseDC
DestroyWindow
GetParent
UpdateWindow
DefWindowProcA
ShowWindow
EnableWindow
TranslateMessage
IsWindowEnabled
GetWindow
GetWindowLongA
SetTimer
SetForegroundWindow
SetFocus
BeginPaint
KillTimer
GetSystemMetrics
GetWindowRect
SetWindowLongA
SetWindowTextA
GetDlgItem
ScreenToClient
LoadCursorA
LoadIconA
GetDesktopWindow
EndDialog
MessageBoxA
DialogBoxParamA
GetSysColor
IsWindowVisible
InvalidateRect
SendMessageA
GetClientRect
FillRect
kernel32
GetStdHandle
GetConsoleOutputCP
WaitForSingleObject
GetDriveTypeA
FindFirstFileW
HeapDestroy
GetFileAttributesW
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
lstrcatA
FreeEnvironmentStringsW
GetTempPathA
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
GetOEMCP
LocalFree
FormatMessageW
InitializeCriticalSection
LoadResource
FindClose
InterlockedDecrement
FormatMessageA
SetLastError
GetEnvironmentVariableA
GetModuleFileNameW
IsDebuggerPresent
FlushFileBuffers
GetModuleFileNameA
LoadLibraryExA
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
CreateThread
SetUnhandledExceptionFilter
MulDiv
GetModuleHandleA
GetCommandLineA
GetCurrentProcessId
GetCurrentThread
GetVersion
GetCurrentThreadId
GetTickCount
GetLastError
ExitProcess
HeapAlloc
GetProcessHeap
VirtualAlloc
Sleep
VirtualFree
UnmapViewOfFile
CreateProcessA
SetStdHandle
GetModuleHandleW
GetACP
CloseHandle
ReadFile
SetFilePointer
RaiseException
HeapSize
WideCharToMultiByte
GetCommandLineW
LockResource
GetEnvironmentStrings
lstrlenW
GetEnvironmentStringsW
LCMapStringA
GetConsoleCP
GlobalFree
lstrlenA
HeapCreate
LCMapStringW
LoadLibraryExW
InterlockedIncrement
CreateFileA
TlsSetValue
GetFileType
CreateEventA
CreateFileW
GetTimeZoneInformation
GlobalLock
DuplicateHandle
FindNextFileA
CreateFileMappingA
ResetEvent
GetDiskFreeSpaceA
FindNextFileW
CompareStringW
GetSystemInfo
GetProcAddress
DeleteFileW
SetEvent
GetWindowsDirectoryA
DeleteFileA
GetFileSize
GetStartupInfoA
LoadLibraryA
GetVersionExA
VirtualProtect
TlsAlloc
QueryPerformanceCounter
FreeLibrary
LoadLibraryW
SetHandleCount
EnterCriticalSection
HeapFree
LeaveCriticalSection
GetLocaleInfoA
SetEndOfFile
GetConsoleMode
VirtualQuery
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
msvcrt
exit
Sections
.text Size: 809KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ