Static task
static1
Behavioral task
behavioral1
Sample
2d2d8e5a633f27af6ebff5b4bdaa9579_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2d2d8e5a633f27af6ebff5b4bdaa9579_JaffaCakes118.exe
Resource
win10v2004-20240708-en
General
-
Target
2d2d8e5a633f27af6ebff5b4bdaa9579_JaffaCakes118
-
Size
240KB
-
MD5
2d2d8e5a633f27af6ebff5b4bdaa9579
-
SHA1
896f977b96dcca414e8f94a965f9e2100d4ee150
-
SHA256
0dbe15686c10ac09b4e1c1e465c1c16832309ad9578c269159cceb53677c3912
-
SHA512
4f4d975c940a8a0b107ea38acf4cd5ffe9167d85f2077f8880a34aadb92fdce4d9efe70199a8020c8f498165efcbfd21ce7b9719d48aa647ed451b423000ecd4
-
SSDEEP
3072:EHvsxJCYclmLb1Jm8ArYEfackuBbp+eTz0kpNr17+:/kYlNANYdcdRpNvHpNr17+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d2d8e5a633f27af6ebff5b4bdaa9579_JaffaCakes118
Files
-
2d2d8e5a633f27af6ebff5b4bdaa9579_JaffaCakes118.exe windows:4 windows x86 arch:x86
0fcabce1dd2c66d8480681bc7a97c455
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EnumWindows
EmptyClipboard
keybd_event
VkKeyScanA
IsWindow
SetFocus
wsprintfA
GetMenu
FindWindowExA
SendMessageA
BlockInput
OpenClipboard
GetWindowTextA
SetClipboardData
CloseClipboard
CharLowerA
FindWindowA
ShowWindow
BringWindowToTop
SetForegroundWindow
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
SysFreeString
VariantClear
VariantInit
SysAllocString
msvcrt
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_strdup
_XcptFilter
_exit
_onexit
__dllonexit
wcslen
toupper
fgets
fclose
_except_handler3
strncat
fopen
fread
strcat
_strlwr
memcpy
_vsnprintf
strcmp
strtok
srand
strncpy
memcmp
_snprintf
memset
atoi
strchr
rand
strcpy
strlen
strstr
??2@YAPAXI@Z
__CxxFrameHandler
malloc
sprintf
realloc
free
_stricmp
fprintf
_controlfp
urlmon
URLDownloadToFileA
kernel32
UnmapViewOfFile
GlobalFree
GetStartupInfoA
WideCharToMultiByte
MultiByteToWideChar
OpenProcess
TerminateProcess
TerminateThread
lstrcpyA
lstrcmpA
lstrcpynA
GetSystemTime
ReadFile
GlobalLock
GlobalUnlock
FindFirstFileA
SetCurrentDirectoryA
GetFullPathNameA
FindNextFileA
FindClose
GetFileSize
SetFilePointer
GetLogicalDriveStringsA
GetDriveTypeA
lstrcatA
CreateDirectoryA
lstrlenA
CreateFileA
WriteFile
GetWindowsDirectoryA
SetFileAttributesA
CopyFileA
GetFileAttributesA
GetVersionExA
GetLocaleInfoA
CreateMutexA
GetTickCount
ReleaseMutex
ExitThread
GetCurrentProcess
CloseHandle
LoadLibraryA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
ExpandEnvironmentStringsA
CreateProcessA
WaitForSingleObject
lstrcmpiA
GlobalAlloc
CreateThread
GetLastError
GetTempPathA
Sleep
InterlockedDecrement
ExitProcess
MapViewOfFile
CreateFileMappingA
advapi32
RegDeleteValueA
RegQueryValueExA
GetUserNameA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
ws2_32
connect
socket
ioctlsocket
closesocket
Sections
.text Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE