Static task
static1
Behavioral task
behavioral1
Sample
2cb8c2ffc39a40367827f443cb6ee1c0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2cb8c2ffc39a40367827f443cb6ee1c0_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2cb8c2ffc39a40367827f443cb6ee1c0_JaffaCakes118
-
Size
380KB
-
MD5
2cb8c2ffc39a40367827f443cb6ee1c0
-
SHA1
909ed30ccd6d64bfe3adc987cf5ede8180c785bb
-
SHA256
cf401cb90339616bd77a93a6a2d730748a43cc33d17403de7d371eeba4838aac
-
SHA512
8817549eec30d200cbc3ef92f78c5082ab65a3fb725f71ae4fbbc9c130f37670edd9b81294f4e4a736666a14ef501ee7e3d24cb1aaead67cab1068e117bf951f
-
SSDEEP
6144:6WfWSXFcxvCO8UFm95XzgryPpl5xCa4izpmAkxnGae5niVd:6WfWSXqS5XSyxlGa4izpDaecX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2cb8c2ffc39a40367827f443cb6ee1c0_JaffaCakes118
Files
-
2cb8c2ffc39a40367827f443cb6ee1c0_JaffaCakes118.exe windows:4 windows x86 arch:x86
3858bab1443f518984d56477dd61cd82
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHSetValueW
StrCatW
PathAppendW
PathFileExistsW
SHGetValueW
kernel32
GetModuleHandleA
lstrcmpW
GlobalFlags
GetVersionExA
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
InterlockedExchange
GetLocaleInfoW
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCommandLineA
HeapAlloc
GetProcessHeap
GetStartupInfoA
HeapReAlloc
RtlUnwind
HeapSize
GetStdHandle
GetModuleFileNameA
GetFileType
CreateFileA
SetStdHandle
SetHandleCount
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetLocaleInfoA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetModuleHandleW
GetVersion
InterlockedDecrement
ReleaseSemaphore
CreateSemaphoreW
CreateFileW
GetCurrentProcess
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
GetSystemTime
LocalFree
FileTimeToLocalFileTime
GetCurrentThreadId
GetLocalTime
FileTimeToSystemTime
FormatMessageW
lstrlenW
WideCharToMultiByte
GetCurrentProcessId
ReleaseMutex
InterlockedCompareExchange
WaitForSingleObject
InterlockedIncrement
FreeLibrary
FindClose
FindNextFileW
FindFirstFileW
GetModuleFileNameW
GetProcAddress
LoadLibraryW
Sleep
CreateDirectoryW
GetTempPathW
CreateProcessW
CloseHandle
GetLastError
CreateMutexW
SetLastError
FindResourceW
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
RaiseException
user32
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
LoadIconW
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
CallWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetWindowsHookExW
CallNextHookEx
GetKeyState
PeekMessageW
ValidateRect
SetWindowPos
SetWindowLongW
GetDlgItem
GetFocus
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
SetWindowTextW
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetWindowThreadProcessId
SendMessageW
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
UnhookWindowsHookEx
LoadCursorW
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowTextW
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
IsWindow
IsWindowVisible
EnableWindow
DispatchMessageW
TranslateMessage
SetMessageExtraInfo
GetMessageW
SetTimer
CreateWindowExW
RegisterClassExW
DefWindowProcW
PostQuitMessage
GetMessageExtraInfo
MessageBoxW
RegisterWindowMessageW
UnregisterClassA
gdi32
ScaleWindowExtEx
SetWindowExtEx
GetStockObject
CreateBitmap
DeleteDC
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
DeleteObject
GetClipBox
SetMapMode
SetTextColor
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegQueryValueW
RegOpenKeyW
RegEnumValueW
RegQueryInfoKeyW
RegOpenKeyExW
shell32
SHGetFolderPathW
SHGetSpecialFolderPathW
ShellExecuteW
ole32
CoInitializeEx
oleaut32
VariantChangeType
VariantClear
VariantInit
Sections
.text Size: 296KB - Virtual size: 294KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ