Static task
static1
Behavioral task
behavioral1
Sample
2d026b577b7022e1b62774d88a0bcc46_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
2d026b577b7022e1b62774d88a0bcc46_JaffaCakes118
-
Size
2.5MB
-
MD5
2d026b577b7022e1b62774d88a0bcc46
-
SHA1
8ccb58e7292cfee27d5dfb9e670812957306216c
-
SHA256
36c6aa87668ae7b0e4204922dea66fb30494a9726402dcac5560480799259f0b
-
SHA512
8b6d5e7e61caefde7f7bf687a0bc6806a1d003a4c892b3d3616b590ca326c4db9045f77e56b5b2abb6fdc96da71a77af779835e0b6bc0dd6f3ca097d26489c3d
-
SSDEEP
49152:k0uzKNJYeBxjz6uLvHNAtF2jP0S950kI+uzp6nwV8YVi1UNqEc/ZJYgP8lX:k0GqJ96OvHi2ISYbHzpL8dSmYgUp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d026b577b7022e1b62774d88a0bcc46_JaffaCakes118
Files
-
2d026b577b7022e1b62774d88a0bcc46_JaffaCakes118.exe windows:4 windows x86 arch:x86
854c336ac5ca4c481669547aa2d2a66f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteExA
SHGetMalloc
user32
BeginPaint
GetSysColor
GetClientRect
SetRect
EndPaint
LoadCursorA
GetLastActivePopup
ShowWindow
PostMessageA
SendMessageA
EnableWindow
GetTopWindow
SetWindowLongA
GetWindowLongA
SetWindowTextA
SetForegroundWindow
SetActiveWindow
SetDlgItemTextA
CharUpperBuffA
LoadIconA
SetWindowWord
SendDlgItemMessageA
GetDlgItem
InvalidateRect
UpdateWindow
LoadStringA
MessageBoxA
SetTimer
GetMessageA
KillTimer
PostQuitMessage
DialogBoxParamA
GetDlgItemTextA
EndDialog
GetWindowRect
GetSystemMetrics
SetWindowPos
PeekMessageA
TranslateMessage
DispatchMessageA
SetCursor
CharNextA
GetWindowWord
DefWindowProcA
RegisterClassA
GetParent
kernel32
InitializeCriticalSection
LoadLibraryA
GetLocaleInfoA
Sleep
EnterCriticalSection
LeaveCriticalSection
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
GetCurrentThreadId
GetVersionExA
FindClose
FindFirstFileA
SetCurrentDirectoryA
CreateDirectoryA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
VirtualAlloc
GetDriveTypeA
GetEnvironmentVariableA
DeleteFileA
SetFileAttributesA
RemoveDirectoryA
SetEndOfFile
SetFilePointer
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileA
GetWindowsDirectoryA
MoveFileExA
_lclose
OpenFile
GlobalFree
GlobalUnlock
GlobalHandle
_llseek
_lread
_lopen
GlobalLock
GlobalAlloc
GlobalMemoryStatus
GetVersion
GetModuleFileNameA
WriteFile
GetSystemTime
CreateProcessA
lstrlenA
LocalFree
ExitProcess
GetModuleHandleA
_lcreat
GetVolumeInformationA
GetTickCount
FormatMessageA
GetLastError
WinExec
_lwrite
WaitForSingleObject
SetErrorMode
HeapReAlloc
GetConsoleCP
GetConsoleMode
HeapSize
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
LocalAlloc
FindNextFileA
RtlUnwind
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
gdi32
SetTextColor
SetTextAlign
GetBkColor
GetTextExtentPoint32A
ExtTextOutA
CreateDCA
GetDeviceCaps
CreateFontIndirectA
DeleteDC
SelectObject
DeleteObject
SetBkColor
comctl32
ord17
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_winzip_ Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE