Static task
static1
Behavioral task
behavioral1
Sample
2b132cf8142b4fd12e964688e7c770fa_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
2b132cf8142b4fd12e964688e7c770fa_JaffaCakes118
-
Size
396KB
-
MD5
2b132cf8142b4fd12e964688e7c770fa
-
SHA1
54454dc057f8452b539b73366bfa95cb98fceaca
-
SHA256
d50298bd839771d40a33fe6b0d2c9364c6d02b5da15f5a5765632e0b267874a6
-
SHA512
6e627809b15e2f15764aeb4f8dc9c350440522e73cde52ae51fed8ff9610e7df42729a6ce6cea477b3922a5f9dbc583ffa95beedfe8bf9e84df9f98271fa09a8
-
SSDEEP
6144:jYuxmYhSt3MImTs/ZO6Ss//JoOeAxbzedP8163el8ecK:jatt3MImcZlJFbym6V8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b132cf8142b4fd12e964688e7c770fa_JaffaCakes118
Files
-
2b132cf8142b4fd12e964688e7c770fa_JaffaCakes118.exe windows:4 windows x86 arch:x86
0c8610714516a4f666cc76ada0f57095
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalReAlloc
TlsGetValue
GlobalFlags
WritePrivateProfileStringA
GetFileAttributesA
GetFileTime
SetErrorMode
GetProcessVersion
GetCPInfo
GetOEMCP
FileTimeToSystemTime
FileTimeToLocalFileTime
GetTimeZoneInformation
GetSystemTime
GetLocalTime
RtlUnwind
HeapFree
HeapAlloc
RaiseException
HeapReAlloc
GetStartupInfoA
GetCommandLineA
ExitProcess
TerminateProcess
TlsSetValue
GetACP
GetEnvironmentVariableA
HeapDestroy
HeapCreate
IsBadWritePtr
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
SetLastError
FreeLibrary
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalUnlock
LocalFree
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
lstrcpyA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
GlobalLock
GlobalDeleteAtom
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
FindFirstFileA
FindNextFileA
FindClose
SetFilePointer
WriteFile
CreateFileA
GetFileSize
ReadFile
GetModuleFileNameA
MoveFileExA
DeleteFileA
CopyFileA
Sleep
GetVersionExA
GlobalAlloc
GlobalFree
OpenProcess
GetCurrentProcessId
DuplicateHandle
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
GetLastError
GetCurrentProcess
FindResourceA
SizeofResource
LoadResource
VirtualQuery
GetTickCount
GetSystemDirectoryA
GetWindowsDirectoryA
VirtualAlloc
VirtualFree
VirtualProtect
GetModuleHandleA
LoadLibraryA
GetProcAddress
HeapSize
lstrcmpA
user32
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
LoadIconA
SetWindowTextA
ClientToScreen
GetDC
ReleaseDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
GetClassNameA
PtInRect
LoadStringA
GetSysColorBrush
DestroyMenu
CopyRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextA
GetDlgCtrlID
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
EndDialog
DestroyWindow
GetDlgItem
UnhookWindowsHookEx
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
CharUpperA
wsprintfA
PostQuitMessage
PostMessageA
EnableWindow
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
GetForegroundWindow
ShowWindow
UnregisterClassA
gdi32
DeleteObject
SetWindowExtEx
DeleteDC
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
ScaleWindowExtEx
GetObjectA
SetBkColor
SetTextColor
GetClipBox
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
SaveDC
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
RegOpenKeyExA
GetUserNameA
RegDeleteKeyA
RegQueryValueExA
RegCloseKey
RegSetValueExA
GetTokenInformation
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
SetFileSecurityA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
InitiateSystemShutdownA
shell32
ShellExecuteA
comctl32
ord17
ntdll
NtQueryObject
NtQuerySystemInformation
RtlAdjustPrivilege
wininet
FindCloseUrlCache
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
DeleteUrlCacheEntry
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 268KB - Virtual size: 267KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ