Static task
static1
Behavioral task
behavioral1
Sample
2f154770d465f8f9f45f514a86619e97_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2f154770d465f8f9f45f514a86619e97_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2f154770d465f8f9f45f514a86619e97_JaffaCakes118
-
Size
78KB
-
MD5
2f154770d465f8f9f45f514a86619e97
-
SHA1
571bafabaa20142f9296c0b899b791a44b58427b
-
SHA256
1b18e0cbf3aa21e3d5085a02f1dbded7504dc125b768b3fd99e449d4ea46580a
-
SHA512
a4002ec1d98f72136af49835d858092fd0b0dcf6040e2cecc98800dd982800e7f2974d26a075ec3153bc58cf8bdaeddcfc4d33f1ef3784fe78dcde9ba8583251
-
SSDEEP
1536:uQVSYZIfDUfiVxXcQckagLzFVc65zSJiknMBQiry:/V9ZQDUKxXcRkPlLSJiNQiry
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f154770d465f8f9f45f514a86619e97_JaffaCakes118
Files
-
2f154770d465f8f9f45f514a86619e97_JaffaCakes118.exe windows:5 windows x86 arch:x86
a348d80c905379e8d176f5aba0bb3988
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiA
GetTempPathA
GetModuleFileNameA
GetModuleHandleA
ExpandEnvironmentStringsA
ExitProcess
CloseHandle
WriteFile
CreateFileA
CreateThread
GetTickCount
ExitThread
CreateProcessA
lstrlenA
CreateMutexA
SetErrorMode
GlobalUnlock
GlobalLock
GlobalAlloc
GetFileAttributesA
GetWindowsDirectoryA
GetVersionExA
GetLocaleInfoA
CreateDirectoryA
lstrcatA
GetDriveTypeA
GetLogicalDriveStringsA
HeapCreate
GetModuleFileNameW
GetStdHandle
LocalFree
FlushFileBuffers
CreateFileW
HeapReAlloc
WriteConsoleW
SetStdHandle
LoadLibraryW
SetFileAttributesA
CopyFileA
GetLastError
FormatMessageA
InterlockedDecrement
Sleep
MultiByteToWideChar
LCMapStringW
WideCharToMultiByte
IsValidCodePage
GetStringTypeW
HeapSize
LeaveCriticalSection
EnterCriticalSection
GetConsoleMode
GetConsoleCP
SetFilePointer
GetCurrentProcessId
QueryPerformanceCounter
DeleteCriticalSection
GetFileType
GetOEMCP
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
RtlUnwind
HeapAlloc
GetSystemTimeAsFileTime
GetCommandLineA
HeapSetInformation
GetStartupInfoW
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetProcAddress
RaiseException
HeapFree
GetCPInfo
GetACP
user32
SetForegroundWindow
keybd_event
SetFocus
wsprintfA
CloseClipboard
VkKeyScanA
OpenClipboard
EmptyClipboard
SetClipboardData
ShowWindow
advapi32
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
shell32
ShellExecuteA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
VariantInit
VariantClear
SysAllocString
SysFreeString
ws2_32
WSAStartup
WSACleanup
socket
htons
send
select
recv
closesocket
gethostbyname
inet_addr
ioctlsocket
sendto
connect
shlwapi
PathRemoveFileSpecA
urlmon
URLDownloadToFileA
Sections
.text Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE