Static task
static1
Behavioral task
behavioral1
Sample
2b68273aa64b883dd38cda8a7060593f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2b68273aa64b883dd38cda8a7060593f_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2b68273aa64b883dd38cda8a7060593f_JaffaCakes118
-
Size
318KB
-
MD5
2b68273aa64b883dd38cda8a7060593f
-
SHA1
ed0225340387ebd1896f039241fc8f6182027c2c
-
SHA256
090799e3cfe3c967ed0ba0e5bcd8d01494032c34b53641a7a494d1a381dc0202
-
SHA512
c9dab000b3bd8098b87d4895c8694843af6fab93b9d027d19a2d536f9e5dc79cda67250a5fc4023efa39c6b37d61403094e999f0118ee64e0ae20e4adf63d557
-
SSDEEP
6144:U6M+7pKGiRouCUSl2g9xQK07dAcqG/aAEmsC:Ua7FpDLpoA0hPs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b68273aa64b883dd38cda8a7060593f_JaffaCakes118
Files
-
2b68273aa64b883dd38cda8a7060593f_JaffaCakes118.exe windows:4 windows x86 arch:x86
773761b097cebfe495b1d6519da98dba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
DoEnvironmentSubstW
DragQueryFileW
FindExecutableW
InternalExtractIconListA
wininet
DeleteUrlCacheContainerW
InternetSecurityProtocolToStringA
InternetCreateUrlW
gdi32
Pie
GetGraphicsMode
StretchBlt
WidenPath
GetMetaRgn
GetTextExtentExPointA
GetObjectW
SetViewportOrgEx
GetFontData
GetLogColorSpaceW
GetCharWidthFloatA
CreateScalableFontResourceW
SelectObject
OffsetClipRgn
SetICMProfileW
SetDIBitsToDevice
EnumFontsA
LineTo
CreateDIBPatternBrushPt
GetMetaFileW
GetCharABCWidthsW
kernel32
HeapDestroy
GetDateFormatA
VirtualProtect
TlsAlloc
GetACP
GetTimeFormatA
InitializeCriticalSection
VirtualAlloc
ReadFile
ContinueDebugEvent
GetUserDefaultLCID
LCMapStringA
GetProcAddress
CloseHandle
GetLastError
TlsGetValue
HeapFree
SetLastError
FlushFileBuffers
DeleteCriticalSection
VirtualFree
GlobalFree
WriteFile
EnterCriticalSection
FreeEnvironmentStringsW
LoadLibraryA
IsValidLocale
IsBadWritePtr
GetTickCount
GetStringTypeA
HeapCreate
HeapReAlloc
CompareStringA
LCMapStringW
GetEnvironmentStrings
CompareStringW
GlobalDeleteAtom
GetCurrentProcessId
InterlockedExchange
HeapSize
CreateMutexA
VirtualQuery
SetHandleCount
MultiByteToWideChar
GetModuleHandleA
GetCurrentThreadId
GetOEMCP
TlsSetValue
ExitProcess
TerminateProcess
LeaveCriticalSection
IsValidCodePage
GetModuleFileNameA
GetStringTypeW
GetCommandLineA
WideCharToMultiByte
GetCPInfo
GetCurrentProcess
GetStartupInfoA
GetSystemTimeAsFileTime
EnumDateFormatsA
GetVersionExA
GetCurrentThread
SetStdHandle
GetStdHandle
SetEnvironmentVariableA
RtlUnwind
UnhandledExceptionFilter
GetSystemInfo
GetLocaleInfoA
EnumSystemCodePagesA
QueryPerformanceCounter
TlsFree
GetLocaleInfoW
GetFileType
GetEnvironmentStringsW
HeapAlloc
FreeEnvironmentStringsA
EnumSystemLocalesA
OpenMutexA
SetFilePointer
GetTimeZoneInformation
user32
EndMenu
InSendMessage
LoadCursorA
GetScrollRange
GetMenuStringW
RegisterClassExA
CallMsgFilterA
SetPropW
LookupIconIdFromDirectoryEx
GetMenuItemID
GetMessageA
CreateWindowExA
LoadMenuIndirectW
CharUpperA
RegisterClassA
CloseDesktop
DdeCreateStringHandleA
UnregisterDeviceNotification
comctl32
InitCommonControlsEx
advapi32
CreateServiceA
LookupSecurityDescriptorPartsA
DuplicateTokenEx
CryptAcquireContextW
Sections
.text Size: 195KB - Virtual size: 194KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ