Static task
static1
Behavioral task
behavioral1
Sample
2f870e210324a114606601c31f77469a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2f870e210324a114606601c31f77469a_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2f870e210324a114606601c31f77469a_JaffaCakes118
-
Size
556KB
-
MD5
2f870e210324a114606601c31f77469a
-
SHA1
83824ab293d51214ca58d51c35386ebca20f4483
-
SHA256
9158adbe9cb054454c6d353df6aec52ffa153abd82fd3d4042b14ec77b4e3b97
-
SHA512
b8e314bb81848f690afdcc67c471911d1147ac976b507f290ba1ecd7c80f688fef35331ad21879479bf0aafa949a2d011453cc002248fafe646ab409a38fb762
-
SSDEEP
12288:TxPYGVM9PTEvuh6fw5QG0CtVMHCK/+PiA6kWTXL09Yk9:NwGVePT3V0CMF+w74
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f870e210324a114606601c31f77469a_JaffaCakes118
Files
-
2f870e210324a114606601c31f77469a_JaffaCakes118.exe windows:4 windows x86 arch:x86
3567df3dc2dfed2ff5cd4aed6de60be2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord2763
ord6662
ord3337
ord533
ord5194
ord798
ord3811
ord6407
ord1997
ord1601
ord5710
ord939
ord4129
ord823
ord825
ord941
ord537
ord2764
ord5856
ord540
ord5683
ord4277
ord4278
ord858
ord6874
ord860
ord2818
ord535
ord800
ord536
ord2915
ord5572
ord354
ord5186
ord665
ord5773
ord5442
ord1979
msvcrt
__dllonexit
clearerr
strerror
fputc
fseek
fflush
free
fclose
fread
fwrite
malloc
_errno
fopen
_fdopen
fprintf
ftell
_stricmp
_strnicmp
_onexit
_exit
_XcptFilter
abs
strcmp
time
srand
rand
strstr
_vsnprintf
_except_handler3
_mbsicmp
memcmp
wcslen
_wcsicmp
_mbscmp
sprintf
getenv
strcat
memset
strcpy
__CxxFrameHandler
memcpy
printf
strlen
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_strcmpi
kernel32
ReadFile
CloseHandle
GetModuleFileNameA
FindResourceA
LoadResource
LockResource
SizeofResource
CreateThread
CreateFileA
HeapAlloc
GetProcessHeap
GetLastError
GetSystemInfo
OutputDebugStringA
CreateRemoteThread
GetProcAddress
GetModuleHandleA
GetSystemDirectoryA
FindClose
FindFirstFileA
CreateDirectoryA
CreateProcessA
GetStartupInfoA
CopyFileA
WriteFile
MultiByteToWideChar
GetCurrentProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
UnmapViewOfFile
ReadProcessMemory
MapViewOfFile
CreateFileMappingA
WriteProcessMemory
VirtualProtectEx
VirtualQueryEx
HeapFree
GetFileSize
GlobalAlloc
LoadLibraryExA
GlobalFree
GetExitCodeThread
TerminateThread
GetLocalTime
SetLocalTime
GetVersionExA
IsBadReadPtr
LocalFree
GetFileInformationByHandle
CreatePipe
GetStdHandle
GetVersion
Sleep
lstrcatA
LoadLibraryA
FreeLibrary
lstrlenA
VirtualAllocEx
OpenProcess
user32
PostMessageA
FindWindowExA
MessageBoxA
FindWindowA
advapi32
AdjustTokenPrivileges
OpenProcessToken
DeregisterEventSource
ReportEventA
RegisterEventSourceA
CloseServiceHandle
StartServiceA
RegCloseKey
RegSetValueExA
RegOpenKeyA
CreateServiceA
OpenSCManagerA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegEnumValueA
RegOpenKeyExA
SetSecurityInfo
SetEntriesInAclA
GetUserNameA
GetSecurityInfo
LookupPrivilegeValueA
shell32
ShellExecuteA
msvcp60
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
?get@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PADHD@Z
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@N@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
Sections
.text Size: 112KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 408KB - Virtual size: 405KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ