Static task
static1
Behavioral task
behavioral1
Sample
2bcb4e143c6227f55a82a3bf53328a5b_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2bcb4e143c6227f55a82a3bf53328a5b_JaffaCakes118.exe
Resource
win10v2004-20240708-en
General
-
Target
2bcb4e143c6227f55a82a3bf53328a5b_JaffaCakes118
-
Size
20KB
-
MD5
2bcb4e143c6227f55a82a3bf53328a5b
-
SHA1
637e3cd0fca75b00018c9bd626b3d680afdd7e30
-
SHA256
10aaad9362667ed93519496392ecc8758291b79e8b89b6c271342ad1005b6090
-
SHA512
c0d8fe5dba646d1faaaad6df47fc0c06d25974af35986663724e17949d7fec8f0ae0eb081ecaed7dfefeaa7e888763dabd1e1caa547e97a0a5d8ec550986f414
-
SSDEEP
384:CBe1lxJLhlx3ZkAJeSBeVwW8LUfzeiqsDC8Dn/mt3IeQr:tjJLfVZJh8VwRLUhHDC0cQr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2bcb4e143c6227f55a82a3bf53328a5b_JaffaCakes118
Files
-
2bcb4e143c6227f55a82a3bf53328a5b_JaffaCakes118.exe windows:4 windows x86 arch:x86
6bfa03e2d4fe8e859ddcbe6e24a695eb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
VirtualAlloc
GetVersion
GetVersion
ExitProcess
FreeLibrary
LockResource
FreeResource
VirtualQuery
SizeofResource
LeaveCriticalSection
InitializeCriticalSection
TlsGetValue
GlobalDeleteAtom
CompareStringA
EnterCriticalSection
LoadResource
VirtualProtect
GetLocaleInfoA
SetThreadLocale
GetDiskFreeSpaceA
VirtualFree
LocalAlloc
GetSystemInfo
GetProcAddress
UnhandledExceptionFilter
GlobalHandle
EnterCriticalSection
GetProcAddress
SetEvent
GetCurrentThreadId
VirtualQuery
GetModuleFileNameA
GetThreadLocale
LoadLibraryA
WriteFile
GlobalFree
CreateThread
GetCommandLineA
LeaveCriticalSection
MultiByteToWideChar
SetFilePointer
TlsGetValue
InterlockedIncrement
lstrcpyA
GetStdHandle
GlobalReAlloc
GetLastError
GetVersionExA
FindClose
CreateFileA
InitializeCriticalSection
FormatMessageA
GetModuleFileNameA
FindResourceA
GetStartupInfoA
InterlockedExchange
ReadFile
lstrcpynA
GetACP
MulDiv
SetEndOfFile
GetThreadLocale
user32
GetMenuItemID
EnumWindows
ShowWindow
IsWindowVisible
GetDesktopWindow
CharLowerA
RegisterClipboardFormatA
GetScrollPos
DrawEdge
SetRect
IsChild
FindWindowA
TranslateMDISysAccel
MapVirtualKeyA
GetIconInfo
CallNextHookEx
ReleaseDC
GetPropA
DestroyWindow
SetParent
GetWindowTextA
EqualRect
SystemParametersInfoA
IsZoomed
GetFocus
GetKeyboardType
PostQuitMessage
GetMenuItemCount
CheckMenuItem
SetCapture
GetSystemMenu
SetMenu
GetWindowLongA
DrawTextA
SetWindowLongA
InvalidateRect
TrackPopupMenu
LoadBitmapA
GetDC
CharNextA
OffsetRect
GetKeyboardLayoutList
ActivateKeyboardLayout
PtInRect
ClientToScreen
ScreenToClient
GetWindow
DefFrameProcA
SetClassLongA
DestroyIcon
DrawMenuBar
GetWindowThreadProcessId
EndPaint
ShowCursor
IntersectRect
FillRect
IsRectEmpty
GetCapture
IsIconic
GetActiveWindow
TranslateMessage
GetClientRect
LoadCursorA
WaitMessage
GetClassNameA
UpdateWindow
GetClassInfoA
KillTimer
IsDialogMessageA
ShowScrollBar
FrameRect
ShowOwnedPopups
SetTimer
DrawIconEx
GetTopWindow
DestroyMenu
SetCursor
GetSystemMetrics
GetScrollRange
GetMenuStringA
GetLastActivePopup
CharToOemA
PeekMessageA
GetKeyNameTextA
SetWindowPos
InsertMenuItemA
EnableMenuItem
SetScrollPos
GetWindowPlacement
DrawFrameControl
DestroyCursor
RemovePropA
GetMenuState
CallWindowProcA
RegisterClassA
GetKeyboardState
LoadStringA
SetWindowsHookExA
gdi32
GetSystemPaletteEntries
CreatePalette
SetStretchBltMode
LineTo
GetBrushOrgEx
CreateBitmap
RestoreDC
GetObjectA
CreateFontIndirectA
SetDIBColorTable
GetTextExtentPoint32A
DeleteDC
SetTextColor
MoveToEx
GetClipBox
CreateBrushIndirect
SaveDC
GetPaletteEntries
SetBrushOrgEx
CreateSolidBrush
ExcludeClipRect
UnrealizeObject
RectVisible
GetDCOrgEx
CreateCompatibleBitmap
SelectObject
GetPixel
CreatePenIndirect
IntersectClipRect
RealizePalette
GetCurrentPositionEx
GetDeviceCaps
CreateDIBSection
SetBkColor
GetStockObject
CreateHalftonePalette
SetROP2
GetWindowOrgEx
Sections
ksjfaf Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
ewrups Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE