e:\gxaeeg\ctim
Static task
static1
Behavioral task
behavioral1
Sample
2ef8d4e83faf63cd906f96c51da4589f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2ef8d4e83faf63cd906f96c51da4589f_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2ef8d4e83faf63cd906f96c51da4589f_JaffaCakes118
-
Size
704KB
-
MD5
2ef8d4e83faf63cd906f96c51da4589f
-
SHA1
ebabd46fe3334ae8b83ec75b91b3a01c7ab4f282
-
SHA256
e5c91bcb8d6300cdf4ee7ae8f539310d5ee68cd2086b86d28921a8fdbec55727
-
SHA512
6cb648326069a6dc89bcbca3219bf0e8681023d27df6c252f656e8493302b03eca93cfc9158a660e47f2b6621ea751fd9a432c9c03626e2314dc2d9340fb60e2
-
SSDEEP
12288:aUVdWS+LHtbmxjWyp2ULvEXMM4P6QlKcojc+hkzXNoxFRq/d+l46yGfOg:aGdl4m5LciPXKo+Umxzsdg9h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ef8d4e83faf63cd906f96c51da4589f_JaffaCakes118
Files
-
2ef8d4e83faf63cd906f96c51da4589f_JaffaCakes118.exe windows:4 windows x86 arch:x86
d7bd7de85e053d2954b53d86e19ccdd6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
CryptSetProviderW
RegEnumKeyW
RegDeleteKeyW
RegSaveKeyW
RegDeleteValueW
CryptSetProviderA
LookupPrivilegeDisplayNameW
CryptGetHashParam
LookupPrivilegeValueW
CryptGetProvParam
CryptEnumProvidersW
CryptSetProviderExW
RegFlushKey
RegCreateKeyW
LogonUserW
LookupAccountSidA
CreateServiceA
CryptDecrypt
LookupPrivilegeNameW
CryptDeriveKey
RegQueryValueExA
ReportEventA
kernel32
GetLastError
GetModuleFileNameA
GetStdHandle
HeapFree
GetStringTypeW
GetStartupInfoW
CreateMailslotW
GetCPInfo
TlsGetValue
GetProcAddress
FreeEnvironmentStringsA
TlsFree
CloseHandle
MultiByteToWideChar
EnterCriticalSection
GetSystemTime
GetCommandLineA
VirtualQuery
RtlUnwind
GetCurrentProcessId
IsBadWritePtr
HeapAlloc
HeapDestroy
InitializeCriticalSection
GetLocalTime
SetStdHandle
HeapReAlloc
CreateMutexA
LeaveCriticalSection
GetStringTypeA
LCMapStringA
GetNumberFormatA
QueryPerformanceCounter
InterlockedExchange
WriteConsoleOutputA
GetFileType
InterlockedDecrement
DeleteCriticalSection
SetFilePointer
WriteFile
InterlockedIncrement
GetCurrentProcess
GetEnvironmentStringsW
TerminateProcess
LoadLibraryA
OpenMutexA
FlushFileBuffers
GetCurrentThread
ReadFile
GetTimeZoneInformation
GetTickCount
ContinueDebugEvent
HeapCreate
VirtualFree
GetModuleHandleA
GetModuleFileNameW
CompareStringA
GetSystemTimeAsFileTime
VirtualAlloc
UnhandledExceptionFilter
TlsSetValue
LCMapStringW
GetStartupInfoA
GetEnvironmentStrings
FreeEnvironmentStringsW
CompareStringW
SetEnvironmentVariableA
GetCommandLineW
TlsAlloc
GetVersion
SetLastError
SetHandleCount
FlushInstructionCache
GetCurrentThreadId
ExitProcess
WideCharToMultiByte
wininet
SetUrlCacheEntryGroup
InternetCreateUrlA
InternetCreateUrlW
HttpQueryInfoA
InternetAutodialHangup
InternetConfirmZoneCrossingW
FtpGetFileA
comctl32
ImageList_DragLeave
DrawInsert
CreatePropertySheetPageW
ImageList_GetIcon
InitCommonControlsEx
_TrackMouseEvent
ImageList_Replace
ImageList_DragMove
MakeDragList
ImageList_AddIcon
ImageList_SetDragCursorImage
CreateToolbarEx
ImageList_Copy
CreatePropertySheetPage
CreateToolbar
ImageList_Destroy
user32
RealGetWindowClass
DdeGetData
IsCharLowerW
GetMonitorInfoW
ToUnicodeEx
RegisterClipboardFormatA
RegisterClassExA
CharPrevW
IsCharAlphaNumericW
DrawCaption
LoadMenuA
CharUpperBuffA
PtInRect
RegisterClassA
GetProcessDefaultLayout
GetScrollInfo
SetMenuItemInfoA
comdlg32
ReplaceTextW
GetFileTitleW
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 436KB - Virtual size: 435KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 148KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ