Static task
static1
Behavioral task
behavioral1
Sample
2af29e7e5e07d9aca6d0d1f941390924_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2af29e7e5e07d9aca6d0d1f941390924_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2af29e7e5e07d9aca6d0d1f941390924_JaffaCakes118
-
Size
219KB
-
MD5
2af29e7e5e07d9aca6d0d1f941390924
-
SHA1
db9dc6ddc8f698807ffcb0805369afa654877ead
-
SHA256
b496d04cbc41dc1aee247b71c4d9364bad70626e44309d0e83c2067edac756c2
-
SHA512
eab89af3a4030af5ca3527251d578868960f2e330a07e66ac0801443e401382e4d29d8e79cfac1f0e18663c15e1dbe74c37d49f7907dfaedd5a8da03963f06dc
-
SSDEEP
6144:cQGUyJ4Id43ZmcojM09jBIvj2GMVyWO7:984UNI0Dq2GAG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2af29e7e5e07d9aca6d0d1f941390924_JaffaCakes118
Files
-
2af29e7e5e07d9aca6d0d1f941390924_JaffaCakes118.exe windows:5 windows x86 arch:x86
5e0f9a307b9aa9d7b54bd2723275b239
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
GetOEMCP
RtlUnwind
ExitThread
GetCommandLineA
HeapAlloc
HeapFree
RaiseException
VirtualAlloc
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetStdHandle
GetConsoleCP
GetConsoleMode
GetACP
IsValidCodePage
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetProcessHeap
GetLocaleInfoA
InterlockedExchange
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
ResumeThread
GlobalFlags
GlobalAddAtomA
lstrcmpA
GlobalGetAtomNameA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GetCurrentProcessId
InterlockedIncrement
GetModuleHandleW
CompareStringA
GetCurrentProcess
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
GetFileAttributesA
CreateFileA
WaitForSingleObject
InterlockedDecrement
GetModuleHandleA
GetProcAddress
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
LocalAlloc
FreeLibrary
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LoadLibraryA
SetLastError
GetLastError
lstrlenA
WideCharToMultiByte
LoadResource
LockResource
SizeofResource
FindResourceA
OutputDebugStringA
TerminateThread
CreateThread
WinExec
GetModuleFileNameA
GetSystemDirectoryA
DeleteFileA
MoveFileA
MultiByteToWideChar
CreatePipe
GetStartupInfoA
CreateProcessA
CloseHandle
ReadFile
Sleep
GetComputerNameA
GetSystemInfo
GetVersionExA
GetTickCount
LCMapStringA
GetCurrentThreadId
user32
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostQuitMessage
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClientRect
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
GetMenu
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowPos
SetWindowLongA
IsWindow
GetDlgItem
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
GetFocus
PostMessageA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
GetWindowTextA
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetSystemMetrics
gdi32
CreateBitmap
GetStockObject
ExtTextOutA
DeleteDC
TextOutA
RectVisible
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
GetDeviceCaps
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
Escape
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegQueryValueExA
RegEnumValueA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
shell32
SHGetSpecialFolderPathA
shlwapi
UrlUnescapeA
ws2_32
WSAGetLastError
send
recv
connect
closesocket
setsockopt
htons
WSASetLastError
gethostbyname
inet_addr
inet_ntoa
socket
bind
htonl
shutdown
WSACleanup
WSAStartup
ole32
CoCreateInstance
CoInitialize
oleaut32
VariantInit
VariantChangeType
VariantClear
wininet
InternetCanonicalizeUrlA
InternetCrackUrlA
Sections
.text Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ