Static task
static1
Behavioral task
behavioral1
Sample
2bf2a4b45858a68974eb3f5da8ba50a4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2bf2a4b45858a68974eb3f5da8ba50a4_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2bf2a4b45858a68974eb3f5da8ba50a4_JaffaCakes118
-
Size
228KB
-
MD5
2bf2a4b45858a68974eb3f5da8ba50a4
-
SHA1
c809da355f4bb5565d1195cc0fe1853770b115a8
-
SHA256
6d7dce459c5fa1eea8a55f45385b987f253a7b3827d18dbe1bef1efe9a98d00a
-
SHA512
9aaa4117e288cf7b44de131c22d57f1639268e107be599d224d8c2831a4b25bfa92fc2a1d654dfe1d2f063d12710c1032d6010b26389bc4f9a75e76ab3284bf5
-
SSDEEP
3072:ruuIbo4kN7wxrrviArLHkpV+zXXey4CXgmyrmIltvpFps9lOALgqQp9n3:KPbOdwxrrvX4oXuAXg5CmvpFps9cN3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2bf2a4b45858a68974eb3f5da8ba50a4_JaffaCakes118
Files
-
2bf2a4b45858a68974eb3f5da8ba50a4_JaffaCakes118.exe windows:4 windows x86 arch:x86
a60b6268c6375bce666d603573a72b25
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FileTimeToLocalFileTime
SystemTimeToFileTime
GetFileAttributesA
SetFileAttributesA
lstrcmpA
lstrcpyW
FileTimeToSystemTime
MultiByteToWideChar
FormatMessageA
lstrlenA
LocalAlloc
LocalFree
LoadLibraryA
GetProcAddress
DeviceIoControl
GetPriorityClass
GetCurrentThread
GetThreadPriority
CloseHandle
CreateFileA
SetEnvironmentVariableA
CompareStringW
CompareStringA
HeapSize
SetEndOfFile
SetStdHandle
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
InitializeCriticalSection
VirtualProtect
GetOEMCP
GetACP
GetTickCount
GetSystemDirectoryA
CopyFileA
Sleep
GetVersionExA
GetSystemInfo
GetCurrentProcess
GetLastError
FreeLibrary
GetCurrentProcessId
ExitProcess
HeapAlloc
HeapFree
RtlUnwind
DeleteFileA
GetSystemTimeAsFileTime
WideCharToMultiByte
GetModuleHandleA
GetCommandLineA
QueryPerformanceCounter
GetCurrentThreadId
GetModuleFileNameA
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
LCMapStringA
LCMapStringW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
ReadFile
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
InterlockedExchange
VirtualQuery
WriteFile
FlushFileBuffers
GetTimeZoneInformation
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
GetCPInfo
GetLocaleInfoA
CreateDirectoryA
user32
wsprintfA
advapi32
OpenServiceA
RegQueryValueExA
RegOpenKeyExA
DeleteService
ControlService
CloseServiceHandle
OpenSCManagerA
StartServiceA
CreateServiceA
SetServiceStatus
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
SHGetFolderPathA
wsock32
inet_ntoa
recvfrom
inet_addr
closesocket
ioctlsocket
htons
sendto
socket
WSAStartup
bind
setsockopt
ntohs
wintrust
WinVerifyTrust
crypt32
CryptDecodeObject
CertFreeCertificateContext
CryptMsgClose
CertCloseStore
CertVerifyTimeValidity
CertFindCertificateInStore
CryptMsgGetParam
CryptQueryObject
CertGetNameStringA
Sections
.text Size: 112KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE