Static task
static1
Behavioral task
behavioral1
Sample
2a1ce2419c97246cb14bbde685fecd14_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2a1ce2419c97246cb14bbde685fecd14_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2a1ce2419c97246cb14bbde685fecd14_JaffaCakes118
-
Size
72KB
-
MD5
2a1ce2419c97246cb14bbde685fecd14
-
SHA1
6c8a168685b19abc0e5012d21c0e0e3db8dd8fa0
-
SHA256
db0f4c949b92cae3aa326ff1226f7d228316952c3044b5a7fb91f15188a1e5e6
-
SHA512
eb6c8062414d1566efe0d4ef886d4fcae9f298782b4bb0c16ae4892fb43a57eb891b7c15d1c766bfc600cf998ee2754412640c5583d058bb02ad8961fdb06a35
-
SSDEEP
1536:qHa3LnXJLY2cYRTePLP1OfDB22pAkK8Bt9Bm+G:q63DXJLwwePL9ma8Bt9Bm+G
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a1ce2419c97246cb14bbde685fecd14_JaffaCakes118
Files
-
2a1ce2419c97246cb14bbde685fecd14_JaffaCakes118.exe windows:5 windows x86 arch:x86
84f369acf18be002aef8d245bdf58373
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenFileMappingW
CloseHandle
DeleteFileW
CreateProcessW
WaitForSingleObject
CreateFileMappingW
InterlockedIncrement
InterlockedDecrement
GetModuleFileNameW
MoveFileW
MoveFileExW
CreateFileA
WriteConsoleW
GetConsoleOutputCP
HeapAlloc
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
GetStartupInfoW
GetLastError
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
WideCharToMultiByte
HeapSize
GetLocaleInfoA
SetFilePointer
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
SetStdHandle
WriteConsoleA
RaiseException
user32
LoadStringW
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
shell32
SHGetSpecialFolderPathW
ord165
urlmon
URLDownloadToFileW
Sections
.text Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ