Static task
static1
Behavioral task
behavioral1
Sample
2e8c47ab62c3fddabee4322f7b09040a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2e8c47ab62c3fddabee4322f7b09040a_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2e8c47ab62c3fddabee4322f7b09040a_JaffaCakes118
-
Size
1.3MB
-
MD5
2e8c47ab62c3fddabee4322f7b09040a
-
SHA1
cea2bc425989b85af5ce53dec4760ee7f2bb578f
-
SHA256
9392ec18f5d9206eabf6b91a10b7f5da3550c279ddafea19a52e6f014ec30629
-
SHA512
88db47b5879b0accf4f7d863f6793f4ba53808eb4f17c4f736fa8b51db9dc4e1623e14c796602fda03a674ef93a7b7a5ba963db259178fe5ea8cf9f2719eb4be
-
SSDEEP
12288:lxxdWgDAEWorj/RHH+fLnBflWX2FjVeI9nZ/hb9iHLcGlfGcS6kUVzeT:fDAE/RnGnBdWGZv9n1hUHDfGcYUVzG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e8c47ab62c3fddabee4322f7b09040a_JaffaCakes118
Files
-
2e8c47ab62c3fddabee4322f7b09040a_JaffaCakes118.exe windows:4 windows x86 arch:x86
4093ab63c50a918dbe92558d841ee181
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetModuleInformation
GetProcessMemoryInfo
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
shlwapi
PathFindFileNameA
PathFileExistsA
PathRemoveFileSpecA
PathStripPathA
PathIsDirectoryA
PathIsFileSpecA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
winmm
PlaySoundA
waveOutGetNumDevs
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
powrprof
SetSuspendState
IsPwrHibernateAllowed
kernel32
SetEvent
SuspendThread
VirtualProtect
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThread
GetThreadLocale
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetVolumeInformationA
CreateFileA
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
GlobalFlags
GetCPInfo
GetOEMCP
WaitForSingleObject
FindResourceExA
WritePrivateProfileStringA
SetErrorMode
FileTimeToLocalFileTime
GetFileTime
RtlUnwind
HeapReAlloc
VirtualAlloc
GetSystemInfo
VirtualQuery
GetTimeFormatA
GetDateFormatA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetSystemTimeAsFileTime
GetFileInformationByHandle
PeekNamedPipe
GetFileType
GetCommandLineA
GetStartupInfoA
ExitThread
CreateThread
ExitProcess
HeapSize
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetTimeZoneInformation
SetHandleCount
SetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
SetThreadPriority
FileTimeToSystemTime
lstrcmpA
GetModuleFileNameA
CreateEventA
ReleaseSemaphore
CreateSemaphoreA
InterlockedDecrement
GetModuleFileNameW
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
LocalFree
MulDiv
CreateProcessA
ResumeThread
GetVersionExA
GetCurrentDirectoryA
GetTempPathA
TerminateProcess
GetPriorityClass
GetExitCodeProcess
Module32First
Module32Next
GetFullPathNameA
GetLongPathNameA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetCurrentProcess
SetCurrentDirectoryA
GetCommandLineW
GetFileAttributesA
FindFirstFileA
FindNextFileA
FindClose
Sleep
GetCurrentProcessId
SetPriorityClass
lstrcpynA
SetLastError
GetProcAddress
GetModuleHandleA
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
lstrcatA
WinExec
CreateDirectoryA
GetProcessHeap
HeapAlloc
HeapFree
FormatMessageA
lstrcpyA
CloseHandle
OpenProcess
GetTickCount
lstrlenA
CompareStringW
CompareStringA
lstrlenW
GetVersion
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
user32
GetMessageA
GetAsyncKeyState
MapDialogRect
PostQuitMessage
GetSysColorBrush
UnregisterClassA
TranslateMessage
ValidateRect
DestroyMenu
WindowFromPoint
EndPaint
BeginPaint
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
IsWindowEnabled
MoveWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
GetDlgItemTextA
CheckDlgButton
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
TrackPopupMenu
GetKeyState
GetScrollPos
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetMenuState
GetMenuStringA
GetMenuItemID
EnableWindow
CharUpperA
GetWindowRect
InvalidateRect
SendMessageA
GetWindowThreadProcessId
GrayStringA
DrawTextExA
TabbedTextOutA
ReleaseCapture
GetIconInfo
OffsetRect
SetCapture
ClientToScreen
DrawTextA
DrawFrameControl
DrawEdge
FrameRect
DrawStateA
GetDlgItem
LockWindowUpdate
DrawFocusRect
FillRect
CopyRect
ExitWindowsEx
GetFocus
MessageBoxA
DestroyIcon
ShowWindow
GetSystemMetrics
SetForegroundWindow
IsWindowVisible
UpdateWindow
IsIconic
GetSystemMenu
GetMenu
PostMessageA
ModifyMenuA
SetMenuItemInfoA
GetMenuItemCount
SetMenuDefaultItem
EnableMenuItem
AppendMenuA
DrawIcon
GetWindowLongA
EnumWindows
PtInRect
InflateRect
GetClientRect
GetDC
ReleaseDC
RedrawWindow
SetTimer
KillTimer
GetParent
SetCursor
IsWindow
GetSysColor
GetCursorPos
DestroyCursor
CopyIcon
LoadCursorA
SetWindowLongA
GetSubMenu
RemoveMenu
LoadAcceleratorsA
TranslateAcceleratorA
LoadIconA
LoadMenuA
gdi32
CreatePen
CreateSolidBrush
EnumFontFamiliesExA
SetTextColor
GetClipBox
GetDeviceCaps
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
BitBlt
LPtoDP
DPtoLP
GetWindowExtEx
GetViewportExtEx
GetMapMode
GetBkColor
CreateCompatibleDC
CreateCompatibleBitmap
CreateFontA
GetTextExtentPoint32A
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
GetObjectA
CreateFontIndirectA
SetViewportOrgEx
SelectObject
DeleteObject
MoveToEx
LineTo
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
comdlg32
GetFileTitleA
GetSaveFileNameA
CommDlgExtendedError
GetOpenFileNameA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegQueryInfoKeyA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegCreateKeyExA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegCloseKey
OpenServiceA
ControlService
OpenSCManagerA
CloseServiceHandle
EnumServicesStatusExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
shell32
ShellExecuteExA
SHGetFileInfoA
CommandLineToArgvW
Shell_NotifyIconA
SHGetSpecialFolderPathA
SHBrowseForFolderA
SHGetDesktopFolder
SHGetFolderPathA
SHGetPathFromIDListA
SHFileOperationA
comctl32
ImageList_GetIconSize
ImageList_DrawEx
ole32
CLSIDFromProgID
CoCreateInstance
CoUninitialize
CoInitializeEx
oleaut32
SysFreeString
SysStringLen
VarBstrCat
SysAllocStringLen
VariantInit
VariantClear
SysAllocString
VariantChangeType
Sections
.text Size: 334KB - Virtual size: 334KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 854KB - Virtual size: 854KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ