Static task
static1
Behavioral task
behavioral1
Sample
2815e638e23577e742bb8f0b8ae06481_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2815e638e23577e742bb8f0b8ae06481_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2815e638e23577e742bb8f0b8ae06481_JaffaCakes118
-
Size
229KB
-
MD5
2815e638e23577e742bb8f0b8ae06481
-
SHA1
aae0cd8ff6169d6193e1e233065b299c9704de1a
-
SHA256
da834f15145adcc616f0ff1f70d1a7cbe27009f9004ac6bc1c00ea0b663e2697
-
SHA512
eed4be524e3e88bf85d26290c994009bc7c1c594af5aafee60b6d22e7c3e2ad9dfe8b076591d3aa636111f17dc07440f80d91b8a7d28a8567e79159fb5519a0e
-
SSDEEP
6144:tybNb2eXCsnKsV5ePDRSQtxrxPLh6JChmM:twNb2UjnKZPDRfPxT+cT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2815e638e23577e742bb8f0b8ae06481_JaffaCakes118
Files
-
2815e638e23577e742bb8f0b8ae06481_JaffaCakes118.exe windows:5 windows x86 arch:x86
3c17c7fd909faccaf6853e43eafc133f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapSize
LoadLibraryW
CreateFileA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
Sleep
RaiseException
GetSystemTimeAsFileTime
GetCurrentProcessId
lstrcpyA
QueryPerformanceCounter
HeapCreate
InterlockedDecrement
GetCurrentThreadId
SetLastError
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringW
MultiByteToWideChar
GetStringTypeW
SetFilePointer
SetStdHandle
SetEndOfFile
GetProcessHeap
ReadFile
WriteConsoleW
CreateFileW
InterlockedIncrement
TlsFree
CloseHandle
LoadLibraryA
GlobalFree
GetProcAddress
GetLastError
lstrcatA
GlobalAlloc
lstrlenA
GetCurrentProcess
TlsSetValue
TlsGetValue
TlsAlloc
DeleteCriticalSection
GetFileType
SetHandleCount
HeapAlloc
GetTickCount
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
RtlUnwind
HeapFree
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
user32
MoveWindow
GetWindow
EndPaint
DestroyWindow
KillTimer
DrawTextA
GetSubMenu
GetFocus
wsprintfA
GetClientRect
SendMessageA
BeginPaint
EnumWindows
GetDC
GetMenu
LoadIconW
GetScrollInfo
MessageBoxA
InvalidateRect
ReleaseDC
ChangeClipboardChain
ScrollWindow
DefWindowProcA
GetSysColor
ShowWindow
CreatePopupMenu
DrawMenuBar
WindowFromDC
AppendMenuA
MessageBoxW
GetSystemMetrics
SetClipboardViewer
CheckMenuItem
gdi32
GetTextExtentPoint32W
LineTo
ExtFloodFill
DeleteDC
CreateFontIndirectA
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
CreatePen
GetTextMetricsA
CreateSolidBrush
TextOutA
MoveToEx
advapi32
RegCloseKey
RegSetValueExA
RegOpenKeyExW
FreeSid
AllocateAndInitializeSid
LookupAccountSidA
EqualSid
OpenProcessToken
shell32
Shell_NotifyIconA
SHGetFolderLocation
SHGetFileInfoA
ws2_32
WSAStartup
comctl32
ord17
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 148KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ