Static task
static1
Behavioral task
behavioral1
Sample
2b1d6e44ec582a18c747ae373a9f900b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2b1d6e44ec582a18c747ae373a9f900b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2b1d6e44ec582a18c747ae373a9f900b_JaffaCakes118
-
Size
152KB
-
MD5
2b1d6e44ec582a18c747ae373a9f900b
-
SHA1
74ebfc7cc9587edc4487974d4787a210d55a84cd
-
SHA256
bb99adf762092147d0d40984237990b5765d513d9f1a459a0cc3baebf20158b9
-
SHA512
2e9549d0033c76011e2167482ad5d61541e74cd673d967e8b8d4444fe2e2249ab794e0c8d26bbd01ca5f6fc8b0ea34fd07a4801d3b75d3de02620b9b32c20ee2
-
SSDEEP
3072:+Qdq0X5rE2PmjmrjXHchVKxqzFrpWMmxkl+iyDX:+bGrEEm6rrKsqzzpgriyD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b1d6e44ec582a18c747ae373a9f900b_JaffaCakes118
Files
-
2b1d6e44ec582a18c747ae373a9f900b_JaffaCakes118.exe windows:4 windows x86 arch:x86
f914b4ce2eecbc59b58082cb0c081cb6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFlags
GetCPInfo
GetOEMCP
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
GetStartupInfoA
GetCommandLineA
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
IsBadReadPtr
ExitProcess
HeapReAlloc
HeapSize
TerminateProcess
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetUnhandledExceptionFilter
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetTimeZoneInformation
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
InterlockedDecrement
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetModuleHandleA
GetFileTime
GetFileAttributesA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetModuleFileNameA
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
CloseHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
lstrcpynA
FormatMessageA
LocalFree
OutputDebugStringA
DeleteFileA
CopyFileA
DeleteCriticalSection
InitializeCriticalSection
RaiseException
LoadLibraryA
GetProcAddress
FreeLibrary
WritePrivateProfileStringA
GetPrivateProfileStringA
lstrcmpA
CompareStringW
CompareStringA
lstrcatA
lstrcpyA
lstrlenA
lstrcmpiA
GetVersion
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
user32
PostQuitMessage
DestroyMenu
ValidateRect
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
LoadCursorA
GetDC
ReleaseDC
GetSysColorBrush
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowTextA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
LoadIconA
PeekMessageA
MapWindowPoints
MessageBoxA
GetKeyState
SetForegroundWindow
CharUpperA
UnregisterClassA
SendMessageA
GetTopWindow
FindWindowA
GetClientRect
GetMenu
PostMessageA
GetSysColor
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
EnableWindow
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetParent
IsWindowEnabled
GetDlgItem
GetWindowLongA
DestroyWindow
IsIconic
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindowTextA
GetWindow
GetSystemMetrics
gdi32
SetWindowExtEx
GetStockObject
DeleteDC
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteObject
SetMapMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
ScaleWindowExtEx
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
comctl32
ord17
shlwapi
PathIsUNCA
PathStripToRootA
PathFindFileNameA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE