Static task
static1
Behavioral task
behavioral1
Sample
2a7ae05f54011350bd6d6707dfa9592a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a7ae05f54011350bd6d6707dfa9592a_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2a7ae05f54011350bd6d6707dfa9592a_JaffaCakes118
-
Size
296KB
-
MD5
2a7ae05f54011350bd6d6707dfa9592a
-
SHA1
30d33fa1c955dfe61abf5a7e22c795d5511a1ff1
-
SHA256
31eb46c90112e1c1585a13cef23b241f4e1718ff0c32a5a5e5bc03e69a33fb95
-
SHA512
71b810211c69d708466db3d2a8ed428016e817a354366371704a928501f08ed54b4a952fae29e319636c6c817f16f6ce4e9542bf3445fceea53529e80d29c6ef
-
SSDEEP
6144:n8xduoKRAoIPjB3wJyHjAvjUvzQ7zvwpdirHiJGc:mxRFPjxuOjAvlvwWr9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a7ae05f54011350bd6d6707dfa9592a_JaffaCakes118
Files
-
2a7ae05f54011350bd6d6707dfa9592a_JaffaCakes118.exe windows:4 windows x86 arch:x86
3a1919da76573097b1f1d095ac48ef73
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentVariableW
EnumSystemCodePagesW
GetLongPathNameA
RaiseException
CreateMutexA
LCMapStringA
SwitchToFiber
DuplicateHandle
EnumResourceNamesW
GetProfileStringA
lstrcpyA
GetDiskFreeSpaceW
_lread
ReadDirectoryChangesW
DebugBreak
GetSystemInfo
RemoveDirectoryA
OpenMutexA
GetPrivateProfileStringW
GlobalFree
GetThreadPriority
EnumTimeFormatsW
QueryDosDeviceA
GetCommState
GetDiskFreeSpaceExA
CreateEventA
GetACP
ConnectNamedPipe
GetAtomNameA
GlobalAddAtomA
SetEndOfFile
GetTickCount
IsValidLocale
lstrcpynA
GetSystemTimeAsFileTime
OpenFile
Beep
FreeLibraryAndExitThread
VirtualAlloc
lstrcmpA
_lopen
GetCompressedFileSizeW
CloseHandle
MoveFileExA
GetWindowsDirectoryA
lstrcatW
SetNamedPipeHandleState
IsBadWritePtr
GetModuleFileNameW
WritePrivateProfileSectionA
EnumCalendarInfoW
IsBadStringPtrA
MoveFileW
FillConsoleOutputCharacterA
SetEvent
SetCommMask
GetSystemTime
GlobalGetAtomNameW
SetThreadLocale
FindNextChangeNotification
VirtualLock
GetSystemDirectoryW
GetDriveTypeA
FindFirstFileExW
GetDateFormatA
VirtualProtect
SetConsoleTitleA
SetThreadAffinityMask
SetCurrentDirectoryA
GetCurrentDirectoryW
GetCommandLineA
GetVersionExA
lstrlenA
GetProcessHeap
ExitProcess
user32
GetDlgItemTextA
EnumDisplaySettingsA
ClipCursor
OpenWindowStationW
wvsprintfW
GetWindowPlacement
IsCharAlphaNumericA
GetShellWindow
DefMDIChildProcA
BroadcastSystemMessageA
GetScrollInfo
SwitchToThisWindow
GetKeyNameTextA
GetDlgItemTextW
KillTimer
FrameRect
LookupIconIdFromDirectory
EnumDisplayMonitors
FlashWindowEx
VkKeyScanA
CharUpperBuffA
gdi32
PtInRegion
GetPixel
comdlg32
PrintDlgW
FindTextA
GetFileTitleW
advapi32
RegRestoreKeyA
GetTokenInformation
IsValidAcl
CryptDeriveKey
IsValidSecurityDescriptor
ole32
MkParseDisplayName
CoUninitialize
CoCreateInstanceEx
OleGetIconOfClass
shlwapi
PathIsRelativeW
UrlIsW
Sections
.text Size: 284KB - Virtual size: 280KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE