Static task
static1
Behavioral task
behavioral1
Sample
2b0258e1811140329f4b324dbde2731e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2b0258e1811140329f4b324dbde2731e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2b0258e1811140329f4b324dbde2731e_JaffaCakes118
-
Size
64KB
-
MD5
2b0258e1811140329f4b324dbde2731e
-
SHA1
7c9cbca82999043a2d47fa217d32d011d90b01a2
-
SHA256
662bafb04a920beea634318016cbb19f17f5fea94d69ea579e0900c1cd5557e4
-
SHA512
11154b9512c5b50deb3db872c73ae655bd5e474c732b1f84cfb64fac50d6da017ffa31a59916da5020a2a14f3ff4ee6e60d43d1ef5d42447f210f755c94db720
-
SSDEEP
768:hgSBkcfHjjbApqRI8TqRZs8oXlPOOdOl2EdJ9Ralz0Q:h1BvDj8qRZXIOdW+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b0258e1811140329f4b324dbde2731e_JaffaCakes118
Files
-
2b0258e1811140329f4b324dbde2731e_JaffaCakes118.exe windows:4 windows x86 arch:x86
8d186ab152aff83dca8a67bcd93cffe4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileTime
CreateDirectoryW
GetComputerNameW
GlobalMemoryStatus
GetVersionExW
ExitProcess
VirtualProtect
GetModuleHandleW
UnmapViewOfFile
GetFileTime
VirtualQuery
GetCurrentProcessId
CreateFileMappingW
GetTickCount
CreateMutexW
ReleaseMutex
OpenMutexW
GetCommandLineW
GetDriveTypeW
GetDiskFreeSpaceExW
GetVolumeInformationW
RemoveDirectoryW
DeleteFileW
LocalLock
LocalUnlock
LocalAlloc
GetEnvironmentVariableW
PeekNamedPipe
CreateThread
Sleep
GetFullPathNameW
LoadLibraryW
GetProcAddress
FreeLibrary
GetTempPathW
GetTempFileNameW
CreatePipe
HeapFree
CreateProcessW
WaitForSingleObject
ReadFile
MultiByteToWideChar
GetLastError
TerminateProcess
WideCharToMultiByte
VirtualFree
VirtualAlloc
GetModuleFileNameW
GetSystemDirectoryW
MoveFileW
CopyFileW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
LocalFree
GetCurrentProcess
CloseHandle
FindFirstFileW
FindNextFileW
FindClose
GetWindowsDirectoryW
CreateFileW
GetFileSize
SetFilePointer
GetLocalTime
WriteFile
GetProcessHeap
HeapAlloc
MapViewOfFile
user32
GetDesktopWindow
wsprintfW
GetClientRect
GetActiveWindow
DrawTextExW
GetIconInfo
ExitWindowsEx
MessageBoxW
gdi32
SelectObject
SetTextColor
SetBkColor
SetBkMode
DeleteObject
DeleteDC
CreateDCW
GetDIBits
GetObjectW
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
CreateFontW
GetBitmapBits
advapi32
SetServiceStatus
OpenServiceW
DeleteService
OpenSCManagerW
CreateServiceW
CloseServiceHandle
ChangeServiceConfig2W
RegCreateKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
GetUserNameW
LsaNtStatusToWinError
GetTokenInformation
LookupAccountSidW
DuplicateTokenEx
ImpersonateLoggedOnUser
CreateProcessAsUserW
GetSecurityInfo
SetSecurityInfo
GetNamedSecurityInfoW
BuildExplicitAccessWithNameW
SetEntriesInAclW
SetNamedSecurityInfoW
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
StartServiceCtrlDispatcherW
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessDeniedAce
FreeSid
StartServiceW
RegisterServiceCtrlHandlerW
shell32
SHGetFileInfoW
ntdll
wcscmp
_wcsnicmp
wcsncmp
wcscat
wcsstr
memmove
ZwTerminateThread
NtVdmControl
RtlInitUnicodeString
ZwOpenSection
ZwClose
ZwQuerySystemInformation
_chkstk
wcscpy
wcschr
wcsrchr
sprintf
vsprintf
wcslen
_wcsicmp
ws2_32
closesocket
WSAStartup
htonl
bind
WSAGetLastError
listen
ntohs
accept
ioctlsocket
select
__WSAFDIsSet
socket
htons
inet_addr
gethostbyname
connect
recv
send
inet_ntoa
getpeername
mpr
WNetEnumResourceW
WNetOpenEnumW
WNetCloseEnum
Sections
.text Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ