Static task
static1
Behavioral task
behavioral1
Sample
2e8551bbd4000ad1a1fea2808a0b304a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2e8551bbd4000ad1a1fea2808a0b304a_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2e8551bbd4000ad1a1fea2808a0b304a_JaffaCakes118
-
Size
554KB
-
MD5
2e8551bbd4000ad1a1fea2808a0b304a
-
SHA1
480400055999ca2ccd023c50211eaac73c8f48a7
-
SHA256
e5226116e9e43b54f97064873470d9cc227364e4806aaa81af64bd63977add2d
-
SHA512
61beaadc204a4d8e0618c88c09d15639d6de67283d8ef531e4c991eb6d456339e6feffbc71e2fc753fe602e4e3affb5a9f8e77027a7e558ef24979d6bf600e77
-
SSDEEP
12288:lQagPLbvA3hCO2SPFaJwxSbiR/raSbaOOcbePN8+EtmKdAjkFu7Dt/:a1PPyD2K4AJbRO6Wjk6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e8551bbd4000ad1a1fea2808a0b304a_JaffaCakes118
Files
-
2e8551bbd4000ad1a1fea2808a0b304a_JaffaCakes118.exe windows:4 windows x86 arch:x86
5008dabc187479fbd83e3026ee04a6d0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
ChooseFontW
FindTextW
ChooseFontA
FindTextA
gdi32
FloodFill
Arc
GetRegionData
GetMapMode
SetTextCharacterExtra
GetLogColorSpaceA
GetWindowOrgEx
GetCharWidthFloatA
SetEnhMetaFileBits
ChoosePixelFormat
GetNearestColor
GetOutlineTextMetricsA
kernel32
UnhandledExceptionFilter
CompareStringW
TlsFree
AddAtomA
WriteConsoleA
GlobalFindAtomW
GetCommandLineW
VirtualFree
OpenMutexA
TlsAlloc
GetDiskFreeSpaceW
GetDateFormatA
HeapFree
GetCurrentProcess
GetStdHandle
GetCPInfo
InterlockedExchange
InterlockedIncrement
GetOEMCP
HeapDestroy
GetDiskFreeSpaceExA
GetProcessHeaps
SetLocaleInfoA
CreateMutexA
GetModuleFileNameW
GetEnvironmentStringsW
GetModuleHandleA
IsValidCodePage
GetConsoleCP
WriteFile
SetLastError
GetConsoleMode
SetEnvironmentVariableA
HeapCreate
GetConsoleOutputCP
SetWaitableTimer
LeaveCriticalSection
IsValidLocale
ReadFile
GetACP
GetTickCount
GetCurrentThreadId
FreeEnvironmentStringsW
LCMapStringW
GetTimeFormatA
GetTimeZoneInformation
GetProfileStringW
MultiByteToWideChar
WaitCommEvent
CompareStringA
GetStringTypeA
LoadLibraryA
GetTempPathA
HeapSize
GetFileType
EnterCriticalSection
SetStdHandle
ReadConsoleOutputA
WriteConsoleW
GetSystemInfo
GetStartupInfoW
DeleteCriticalSection
GetCurrentProcessId
ExitProcess
EnumSystemLocalesA
WideCharToMultiByte
InterlockedDecrement
Sleep
InitializeCriticalSectionAndSpinCount
HeapReAlloc
GetComputerNameW
GetStringTypeW
WaitForMultipleObjects
GetCurrentThread
TerminateProcess
GetCalendarInfoA
GetProcAddress
TlsSetValue
TlsGetValue
EnumTimeFormatsA
GetSystemTimeAsFileTime
RtlUnwind
FreeLibrary
GetModuleHandleW
VirtualAlloc
IsDebuggerPresent
GetStartupInfoA
LCMapStringA
SetFilePointer
CreateFileA
GetCommandLineA
GetLastError
SetConsoleCtrlHandler
QueryPerformanceCounter
SetHandleCount
GetModuleFileNameA
FlushFileBuffers
GetLocaleInfoA
HeapAlloc
SetUnhandledExceptionFilter
CloseHandle
GetLocaleInfoW
VirtualQuery
GetUserDefaultLCID
user32
PtInRect
GetPropW
GetAncestor
CreateDesktopA
CloseWindow
SetMenuContextHelpId
GetKeyNameTextA
ToUnicodeEx
CharToOemA
RegisterClassA
RegisterClassExA
PeekMessageA
wvsprintfA
SetWindowsHookExW
EnableScrollBar
GetClassLongA
CallNextHookEx
shell32
SheSetCurDrive
comctl32
InitCommonControlsEx
advapi32
InitializeSecurityDescriptor
LogonUserW
RegFlushKey
GetUserNameA
LookupAccountNameW
RegLoadKeyW
RegEnumValueW
CryptSignHashW
RegCreateKeyExA
CryptGetProvParam
RevertToSelf
CryptSignHashA
CryptAcquireContextW
CryptContextAddRef
LookupAccountNameA
LookupSecurityDescriptorPartsA
RegQueryValueExA
CryptSetProviderExW
CryptDecrypt
CreateServiceA
RegDeleteValueW
Sections
.text Size: 217KB - Virtual size: 216KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 315KB - Virtual size: 315KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ