Static task
static1
Behavioral task
behavioral1
Sample
2b367e434e1a08109ea738275364e4b8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2b367e434e1a08109ea738275364e4b8_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2b367e434e1a08109ea738275364e4b8_JaffaCakes118
-
Size
56KB
-
MD5
2b367e434e1a08109ea738275364e4b8
-
SHA1
fe3b91926a70e9f87004ff80cf51876614e10181
-
SHA256
83e578019e334c7a7ece232d7df08d2a798e229a08cb7e2863a0adb7858e6041
-
SHA512
6495d8a27a195c50c6346c20992ed533f4a42ce4ba1870057783d3aeb82e538b4b83d7cd1965836acf9d3f0236c14a21ed025991145d9a4543a25a1413733284
-
SSDEEP
768:Lql9H8y4ZDnwz/yRmWP1cLTDbVIrxD3/iwsApfWDxNKl5ZylyQw/9:LqoxZ+sP1MSVD36WbylG9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b367e434e1a08109ea738275364e4b8_JaffaCakes118
Files
-
2b367e434e1a08109ea738275364e4b8_JaffaCakes118.exe windows:4 windows x86 arch:x86
2f4115768fab61b29f24eb3489ee55c8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EnumWindows
BlockInput
VkKeyScanA
keybd_event
IsWindow
SetFocus
wsprintfA
GetMenu
FindWindowExA
SendMessageA
GetWindowTextA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
CharLowerA
FindWindowA
ShowWindow
BringWindowToTop
SetForegroundWindow
ole32
CoCreateInstance
CoInitialize
CoUninitialize
oleaut32
SysFreeString
VariantClear
VariantInit
SysAllocString
msvcrt
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
wcslen
fgets
fclose
fprintf
_except_handler3
fopen
strcat
memcpy
_vsnprintf
strcmp
strtok
srand
strncpy
memcmp
_snprintf
memset
atoi
strchr
rand
strcpy
strlen
strstr
??2@YAPAXI@Z
_EH_prolog
__CxxFrameHandler
malloc
sprintf
realloc
free
_stricmp
getchar
urlmon
URLDownloadToFileA
kernel32
GlobalFree
GetDriveTypeA
GetStartupInfoA
WideCharToMultiByte
MultiByteToWideChar
TerminateThread
lstrcpyA
lstrcmpA
lstrcpynA
GetSystemTime
ReadFile
GlobalLock
GlobalUnlock
FindFirstFileA
SetCurrentDirectoryA
GetFullPathNameA
FindNextFileA
FindClose
GetFileSize
SetFilePointer
CreateFileMappingA
MapViewOfFile
lstrcatA
CreateDirectoryA
lstrlenA
Process32First
Process32Next
CreateToolhelp32Snapshot
Module32First
TerminateProcess
Module32Next
OpenProcess
ReadProcessMemory
CreateFileA
WriteFile
GetWindowsDirectoryA
SetFileAttributesA
CopyFileA
GetFileAttributesA
GetVersionExA
GetLocaleInfoA
CreateMutexA
GetTickCount
ReleaseMutex
ExitThread
GetCurrentProcess
CloseHandle
LoadLibraryA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
ExpandEnvironmentStringsA
CreateProcessA
GetLogicalDriveStringsA
WaitForSingleObject
lstrcmpiA
CreateThread
GetLastError
GetTempPathA
Sleep
InterlockedDecrement
ExitProcess
GlobalAlloc
UnmapViewOfFile
advapi32
RegDeleteValueA
RegQueryValueExA
GetUserNameA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE