Static task
static1
Behavioral task
behavioral1
Sample
2affa77892cd2c71b8723e97682683e2_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2affa77892cd2c71b8723e97682683e2_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2affa77892cd2c71b8723e97682683e2_JaffaCakes118
-
Size
165KB
-
MD5
2affa77892cd2c71b8723e97682683e2
-
SHA1
ba3f3b5b2aa354f869d13ada42ba4b5222099de3
-
SHA256
4087a5d3dc01837c89bab044fccd509bdd7fc512267bb8bc09beed40fb2c321b
-
SHA512
8623f5ff50450e97520fb5e1ab121d98a13abc8377746af16c59794dfa85bb885fda6cb51318dd6b52c904850e962991fa1865994cf5077ba35391602e1b54ae
-
SSDEEP
3072:UmIosdOXnhB5+Q5wgAlVtrS8Z8cz2XUfe3tV0RS2N0Sg7ovQ/hD+CSwvTbkRiG:U9e3hmQ58Mne2XUfvbCxoIJQcTww
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2affa77892cd2c71b8723e97682683e2_JaffaCakes118
Files
-
2affa77892cd2c71b8723e97682683e2_JaffaCakes118.exe windows:4 windows x86 arch:x86
57a5042e0fe90eecf48b56318379d36b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
StringFromGUID2
CoTaskMemRealloc
kernel32
SetUnhandledExceptionFilter
GetCommandLineA
VirtualQuery
FreeLibrary
SizeofResource
VirtualAlloc
lstrlenA
GetOEMCP
CloseHandle
SetHandleInformation
GetCurrentProcess
TlsGetValue
RaiseException
HeapCreate
GetThreadLocale
VirtualFree
GetLocaleInfoA
GetStdHandle
IsBadWritePtr
LoadLibraryA
QueryPerformanceCounter
GetStringTypeA
LCMapStringA
LoadLibraryExA
TlsFree
TransmitCommChar
UnhandledExceptionFilter
HeapSize
SetHandleCount
SetLastError
IsDBCSLeadByte
HeapReAlloc
GetSystemTimeAsFileTime
FlushFileBuffers
InitializeCriticalSection
lstrcpynA
GetTickCount
WideCharToMultiByte
InterlockedExchange
GetModuleHandleA
IsBadReadPtr
LeaveCriticalSection
GetEnvironmentStringsW
FindResourceA
VirtualProtect
GetACP
EnumResourceNamesW
HeapDestroy
GetCurrentProcessId
InterlockedIncrement
InterlockedDecrement
lstrcatA
GetSystemInfo
GetVersionExA
ExitProcess
WriteFile
SetStdHandle
lstrcpyA
GetProcessHeap
GetCurrentThreadId
DisableThreadLibraryCalls
LoadResource
EnterCriticalSection
GetEnvironmentStrings
GetProcAddress
TlsAlloc
TerminateProcess
ExitProcess
RtlUnwind
FreeEnvironmentStringsW
LockResource
GetLastError
HeapAlloc
GetModuleFileNameA
GetStartupInfoA
FlushInstructionCache
IsBadCodePtr
lstrlenW
TlsSetValue
LCMapStringW
GetFileType
GetCPInfo
MultiByteToWideChar
GetStringTypeW
DeleteCriticalSection
SetFilePointer
FreeEnvironmentStringsA
MulDiv
lstrcmpiA
HeapFree
shlwapi
PathFindExtensionA
msimg32
AlphaBlend
TransparentBlt
advapi32
RegSetValueExA
RegCloseKey
RegEnumKeyExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegQueryInfoKeyA
gdi32
DeleteObject
GetTextExtentPointA
GetDeviceCaps
GetTextMetricsA
SelectObject
CreateFontIndirectA
user32
ShowWindow
IsWindow
GetDialogBaseUnits
SetWindowLongA
CheckDlgButton
GetDlgItemTextA
WinHelpA
DestroyWindow
MoveWindow
GetDC
IsDialogMessageA
ReleaseDC
UnregisterClassA
GetDlgItem
SendMessageA
SetDlgItemTextA
IsDlgButtonChecked
EnableWindow
CreateDialogParamA
CharNextA
Sections
.text Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.crt Size: 512B - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ