Static task
static1
Behavioral task
behavioral1
Sample
2c6ce502bd887d15edd530cca51e855b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2c6ce502bd887d15edd530cca51e855b_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2c6ce502bd887d15edd530cca51e855b_JaffaCakes118
-
Size
413KB
-
MD5
2c6ce502bd887d15edd530cca51e855b
-
SHA1
c7bfae3e252c6a65b800402b129973df75854403
-
SHA256
0162b09f805f35d3b593cd34093b236fddce89beefc589f67821c12c0e552979
-
SHA512
663e20d7731c4b60594a8bcc52fb5b470f180d00b27ed6ea4eb1ddd2432cb8904ddc1107d1dfa30e22b7674dd0495a8f212f62da69bf68877e5a2aa3543dd5e4
-
SSDEEP
12288:ssh7G3V2S41u1sF628ElukOHSQLp9dvddwwyPG:sT3V2Ww1bOH9P5eP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c6ce502bd887d15edd530cca51e855b_JaffaCakes118
Files
-
2c6ce502bd887d15edd530cca51e855b_JaffaCakes118.exe windows:5 windows x86 arch:x86
75ff015bb63ce5d029239c6ca846cdd8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpA
lstrlenA
GetCurrentProcess
OutputDebugStringW
GetCommandLineA
Sleep
GetModuleFileNameW
lstrcatA
lstrlenW
GetLastError
lstrcmpiA
GetProcAddress
GetModuleFileNameA
GetModuleHandleA
CreateMutexA
OutputDebugStringA
lstrcpyA
VirtualQuery
FlushFileBuffers
CloseHandle
CreateFileW
SetStdHandle
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
InterlockedIncrement
InterlockedDecrement
DecodePointer
GetModuleHandleW
ExitProcess
HeapSetInformation
GetStartupInfoW
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapValidate
IsBadReadPtr
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WideCharToMultiByte
WriteFile
GetStdHandle
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
FreeLibrary
LoadLibraryW
RaiseException
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
RtlUnwind
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
WriteConsoleW
CompareStringW
MultiByteToWideChar
SetEnvironmentVariableA
LCMapStringW
GetStringTypeW
IsProcessorFeaturePresent
SetFilePointer
GetProcessHeap
user32
MessageBoxA
shell32
SHGetFileInfoA
ole32
CoCreateInstance
CoInitialize
Sections
.text Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 186KB - Virtual size: 186KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ