Static task
static1
Behavioral task
behavioral1
Sample
2a59d4ed30a0353f69cce57ad83831ea_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a59d4ed30a0353f69cce57ad83831ea_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2a59d4ed30a0353f69cce57ad83831ea_JaffaCakes118
-
Size
556KB
-
MD5
2a59d4ed30a0353f69cce57ad83831ea
-
SHA1
b2d39bf9a8cdc4d04d813693885b73d20d315b30
-
SHA256
477d9deb21692b80a454f0a9794d0fafc13b5d5e60b271ef46787d9843f3f2df
-
SHA512
df7ae3b549e78828ba75196ae4e981a5b3feaa2d46a0b6692f659d5345353f47571a6f67ce95065b288254ea04063732d3c6763185d02afa6cba5865876ec3d6
-
SSDEEP
12288:tTiCMTiZkq8ul2j9rt5ELxL3Z4gO+GW67IAteL2SLudbHv4xMLtAYkDAC:FiNTkkqjl2j9rt5ELp3Z4NW67p3Z4xmC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a59d4ed30a0353f69cce57ad83831ea_JaffaCakes118
Files
-
2a59d4ed30a0353f69cce57ad83831ea_JaffaCakes118.exe windows:5 windows x86 arch:x86
a238a5f61b8fb928a8b2ca4aabf81837
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadBitmapA
GetSystemMetrics
ScreenToClient
LoadStringW
PostQuitMessage
CharNextExA
GetDlgItem
GetSystemMenu
CreatePopupMenu
GetClipboardData
CopyAcceleratorTableA
IsMenu
GetWindowWord
GetTopWindow
DefDlgProcW
GetOpenClipboardWindow
RegisterHotKey
IsCharAlphaW
SetScrollInfo
shell32
ShellExecuteW
DragAcceptFiles
advapi32
RegOpenKeyA
RegEnumValueA
gdi32
CreateRectRgnIndirect
SetBkMode
RestoreDC
CreateCompatibleBitmap
SetWindowOrgEx
GetCharWidthA
CreatePen
SetPixelV
SetColorSpace
GetPath
EnumICMProfilesW
GetNearestPaletteIndex
SetBrushOrgEx
SelectClipPath
EnumMetaFile
GetPaletteEntries
CreateBitmap
kernel32
InitializeCriticalSectionAndSpinCount
VirtualAlloc
HeapReAlloc
RtlUnwind
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
LoadLibraryA
DeviceIoControl
SetMailslotInfo
GlobalLock
GlobalAlloc
GetModuleFileNameW
RemoveDirectoryW
GetSystemDirectoryW
GetWindowsDirectoryW
OpenSemaphoreW
GetPrivateProfileStringW
HeapAlloc
TlsSetValue
CreateRemoteThread
EnumResourceNamesW
GetPrivateProfileSectionW
DebugActiveProcessStop
GetFullPathNameA
Sleep
VirtualQueryEx
GetCurrentThread
GetModuleFileNameA
HeapDestroy
VirtualProtectEx
VirtualFree
CloseHandle
SetEndOfFile
GetTimeFormatA
SetEnvironmentVariableW
GetProcessHeap
CreateEventA
GlobalMemoryStatusEx
GetCommandLineA
GetStartupInfoA
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LeaveCriticalSection
EnterCriticalSection
Sections
.text Size: 182KB - Virtual size: 182KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 357KB - Virtual size: 357KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ