Static task
static1
Behavioral task
behavioral1
Sample
2d673fb70f0d5d9fa65d06753ecd6d56_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2d673fb70f0d5d9fa65d06753ecd6d56_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2d673fb70f0d5d9fa65d06753ecd6d56_JaffaCakes118
-
Size
340KB
-
MD5
2d673fb70f0d5d9fa65d06753ecd6d56
-
SHA1
3b3ae693693a5c694e51c737008300c000b64da9
-
SHA256
1e7dcfe23856842f9ebae8e09387ba26eeab1e63e066dbbdb2b997e1b9c6d852
-
SHA512
1317c2922fd61ed101de9b553258588317a5a98bcd66aaaa1ba4bcc5978b7795ab2e80227430837b21e99ab4d0ada2790dcead37205dcb082621eba8891554fa
-
SSDEEP
6144:uvlrD3WUkp9xRg1E5HWJXlF/CDlEm/LI8cnddO3delRyQ/jsNmvy:k5kfs1Ia7QlEGE8telRyQ7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d673fb70f0d5d9fa65d06753ecd6d56_JaffaCakes118
Files
-
2d673fb70f0d5d9fa65d06753ecd6d56_JaffaCakes118.exe windows:4 windows x86 arch:x86
7d98027abeca0a254d7fbb8fdcd3edff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetStdHandle
GetSystemDefaultLangID
ExitThread
GetFileType
lstrcmpiA
EnumCalendarInfoA
GetPrivateProfileSectionW
PeekConsoleInputW
QueryDosDeviceW
SetFileAttributesA
CopyFileExW
UnhandledExceptionFilter
_hread
GlobalFindAtomA
WritePrivateProfileStructA
TlsGetValue
GetBinaryTypeW
LoadResource
LoadLibraryExA
SystemTimeToFileTime
WritePrivateProfileStringA
GetCurrentProcessId
VirtualQueryEx
DosDateTimeToFileTime
SetThreadAffinityMask
DeleteCriticalSection
GetModuleFileNameW
GetNumberFormatW
GetBinaryTypeA
CreateMutexA
GetTempPathW
SetProcessShutdownParameters
VirtualAlloc
GetProcessHeap
GetPrivateProfileStringA
GetEnvironmentVariableW
FindFirstFileW
ConnectNamedPipe
LCMapStringA
EnumDateFormatsW
GetVersionExA
VirtualProtect
CreateDirectoryA
GetShortPathNameW
IsDBCSLeadByteEx
FindResourceExW
EnumResourceNamesA
LocalSize
WaitNamedPipeA
GetSystemTime
IsValidLocale
CreateMutexW
_lopen
LocalReAlloc
FreeLibraryAndExitThread
SetConsoleMode
SetEvent
GetCommandLineA
lstrlenA
WritePrivateProfileSectionW
ExitProcess
user32
OffsetRect
IsCharAlphaW
DefFrameProcA
ScrollDC
CreateDesktopW
DefDlgProcW
GetDlgItemInt
SwitchDesktop
ModifyMenuW
LoadMenuA
RegisterDeviceNotificationA
EnumWindowStationsW
DrawIcon
GetWindowDC
GrayStringW
SetDlgItemInt
LoadAcceleratorsW
ChangeDisplaySettingsA
OpenWindowStationA
wvsprintfA
ToUnicode
InvalidateRect
CreateWindowStationW
CharNextA
EqualRect
RemoveMenu
MapVirtualKeyW
GetMenuItemCount
GetMessageW
GetThreadDesktop
GetTabbedTextExtentW
GetInputState
IsWindowEnabled
GetUserObjectSecurity
EnumThreadWindows
GetTitleBarInfo
SetProcessDefaultLayout
CloseDesktop
CreateDesktopA
DialogBoxParamW
ValidateRgn
GetClipboardViewer
SetMenuDefaultItem
IntersectRect
LoadImageW
TabbedTextOutW
EnumDisplayDevicesA
DialogBoxParamA
CheckDlgButton
comdlg32
ChooseColorW
GetFileTitleA
GetOpenFileNameA
advapi32
ImpersonateSelf
GetTokenInformation
RegQueryValueA
GetServiceDisplayNameW
OpenSCManagerW
StartServiceCtrlDispatcherW
RegDeleteKeyW
DuplicateToken
ObjectCloseAuditAlarmW
SetEntriesInAclA
RegQueryValueExW
RegCreateKeyExW
QueryServiceObjectSecurity
GetUserNameW
GetAce
LookupPrivilegeNameA
shell32
Shell_NotifyIconA
SHChangeNotify
SHFileOperationW
FindExecutableA
ole32
OleSetClipboard
CLSIDFromString
CoFreeAllLibraries
oleaut32
SysAllocStringLen
SysFreeString
comctl32
ImageList_AddMasked
shlwapi
PathIsDirectoryEmptyW
PathFindExtensionW
setupapi
SetupDiSetDeviceInstallParamsA
SetupDiDestroyDriverInfoList
SetupGetIntField
SetupDiGetDeviceInfoListDetailA
SetupLogErrorA
SetupGetStringFieldW
SetupDiGetINFClassA
Sections
.text Size: 312KB - Virtual size: 311KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE