Static task
static1
Behavioral task
behavioral1
Sample
2b3651755ab54a63c24e759dfa506ec5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2b3651755ab54a63c24e759dfa506ec5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2b3651755ab54a63c24e759dfa506ec5_JaffaCakes118
-
Size
428KB
-
MD5
2b3651755ab54a63c24e759dfa506ec5
-
SHA1
25b800d5fc0d681e2f3f43e53a5abec0f3a721e3
-
SHA256
702303558b6156e9a1d5f4165855e0d03b9fc487a36eef36cbc9d8828e11479c
-
SHA512
9362369aa9dbe76e2d4e08319f59b68050f73c1a0beaa11fe53a6461607938aa53a649a7eb4be9dd9b8b8565ca15480bd7d39f03b4f1ea677d19de56e062ba7a
-
SSDEEP
12288:FH4d57WLwBA+mLY30b8BA3GmKuw//pvmZsc:94dlPCe0b8W3guwVmCc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b3651755ab54a63c24e759dfa506ec5_JaffaCakes118
Files
-
2b3651755ab54a63c24e759dfa506ec5_JaffaCakes118.exe windows:4 windows x86 arch:x86
1cffcda5a0d65eb71d84accdb2526734
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord4441
ord2648
ord2055
ord6376
ord3749
ord4835
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord3573
ord491
ord768
ord1641
ord489
ord3626
ord2414
ord4258
ord6197
ord4710
ord4976
ord2864
ord2379
ord2754
ord5875
ord4478
ord6055
ord1776
ord5290
ord4837
ord3610
ord656
ord567
ord4275
ord3402
ord3721
ord795
ord1146
ord1168
ord2614
ord2764
ord926
ord536
ord1771
ord6366
ord2413
ord2024
ord4219
ord2581
ord4401
ord3639
ord699
ord686
ord692
ord397
ord384
ord2860
ord2096
ord6453
ord3803
ord2859
ord3619
ord4123
ord4188
ord2753
ord4124
ord2639
ord4284
ord955
ord640
ord6654
ord283
ord1640
ord323
ord3797
ord613
ord5789
ord289
ord3089
ord5981
ord5710
ord5593
ord3438
ord912
ord2302
ord4234
ord6215
ord6199
ord2645
ord4476
ord4160
ord4400
ord3630
ord682
ord6242
ord3706
ord4133
ord4297
ord5788
ord472
ord5786
ord3571
ord5287
ord3798
ord5785
ord470
ord2567
ord2862
ord4774
ord2582
ord3370
ord4402
ord3640
ord693
ord4243
ord6007
ord6374
ord4353
ord6696
ord3996
ord3301
ord3293
ord6905
ord6888
ord3910
ord6907
ord6883
ord541
ord3742
ord818
ord4396
ord3574
ord609
ord5781
ord3874
ord6241
ord4224
ord2452
ord3698
ord765
ord4083
ord2575
ord2642
ord3093
ord1783
ord3092
ord1908
ord1690
ord2528
ord5288
ord4439
ord2054
ord4431
ord771
ord1008
ord496
ord4259
ord6176
ord1768
ord4715
ord2863
ord4287
ord5850
ord2882
ord2646
ord6380
ord538
ord4278
ord6662
ord801
ord6143
ord1233
ord1871
ord2448
ord5834
ord2044
ord5601
ord2827
ord2820
ord3811
ord665
ord1979
ord5442
ord5186
ord354
ord2233
ord296
ord617
ord5222
ord5221
ord825
ord3584
ord3643
ord696
ord543
ord394
ord803
ord6418
ord2393
ord6307
ord909
ord4167
ord521
ord1263
ord5628
ord548
ord4185
ord1166
ord2763
ord6223
ord2919
ord6442
ord5590
ord3258
ord1265
ord6928
ord2405
ord5163
ord5714
ord5289
ord5307
ord4698
ord4079
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord4673
ord2818
ord860
ord2915
ord5572
ord6663
ord537
ord4202
ord540
ord535
ord800
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord2514
ord4998
ord4854
ord4377
ord5265
ord4358
ord4948
ord4742
ord4905
ord5160
ord5162
ord5161
ord1907
ord5683
ord4129
ord6383
ord5440
ord2107
ord6394
ord5450
ord2841
ord6876
ord4204
ord922
ord1187
ord6877
ord6282
ord6283
ord939
ord3663
ord858
ord941
ord542
ord6569
ord802
ord1134
ord2621
ord924
ord5214
ord3401
ord3953
ord2725
ord561
ord823
ord815
ord3738
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord3286
ord3998
ord755
ord5219
ord1799
ord3353
ord614
ord290
ord4003
ord2729
ord2727
ord2730
ord6467
ord4226
ord446
ord743
ord3127
ord3616
ord5651
ord3126
ord3613
ord350
ord1576
ord5608
ord3579
msvcrt
rand
_beginthreadex
sprintf
srand
atol
_mbsstr
??1type_info@@UAE@XZ
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
time
__p___argc
_purecall
fclose
_rmtmp
_setmbcp
malloc
realloc
free
_stricmp
memset
_controlfp
fwrite
tmpfile
fopen
__CxxFrameHandler
fgets
fread
fseek
ftell
memcmp
_mbscmp
__p___argv
_ftol
memcpy
_mbsicmp
_splitpath
strcpy
strcat
strtoul
_mbsnbcpy
atoi
__RTDynamicCast
memmove
strlen
strchr
abs
kernel32
GetCurrentProcessId
GetFileSize
GetComputerNameA
WritePrivateProfileStringA
CreateWaitableTimerA
SetWaitableTimer
GetModuleHandleA
WideCharToMultiByte
MultiByteToWideChar
GetLogicalDrives
GetDriveTypeA
GetVolumeInformationA
ReadFile
CreateProcessA
GetStdHandle
CreatePipe
GetCurrentProcess
DuplicateHandle
GetProcAddress
FreeLibrary
LoadLibraryA
lstrcpyA
lstrcpynA
GetFileAttributesExA
GetModuleFileNameA
GetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
DeleteFileA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
Sleep
GetVersionExA
GetVersion
GetSystemDirectoryA
GetWindowsDirectoryA
lstrlenA
OpenMutexA
CreateMutexA
WaitForSingleObject
CloseHandle
ReleaseMutex
WriteFile
SetFilePointer
CreateEventA
CreateDirectoryA
SetEvent
ResetEvent
HeapFree
GetProcessHeap
HeapAlloc
SetEndOfFile
GlobalFree
SetThreadPriority
TerminateThread
WaitForMultipleObjects
GetTempPathA
SetFileAttributesA
CopyFileA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
lstrcatA
GetShortPathNameA
MoveFileExA
GetStartupInfoA
CreateFileA
GetTempFileNameA
lstrlenW
user32
GetMessageA
DestroyWindow
GetDesktopWindow
TranslateMessage
DispatchMessageA
wsprintfA
CreateWindowExA
AdjustWindowRectEx
GetSystemMenu
InsertMenuA
GetKeyState
RegisterWindowMessageA
DrawStateA
InvalidateRect
FillRect
LoadIconA
GetCursorPos
DestroyIcon
RedrawWindow
GetWindowLongA
ScreenToClient
GetClientRect
EnableWindow
SetCursor
GetSysColor
ShowCursor
GetMessagePos
LoadCursorA
ReleaseDC
GetDC
LoadImageA
IsWindow
KillTimer
OffsetRect
LoadBitmapA
PostMessageA
ClientToScreen
GetWindowRect
GetParent
CopyRect
SetRect
DrawFocusRect
PtInRect
SendMessageA
gdi32
BitBlt
CreateCompatibleBitmap
DeleteObject
GetStockObject
CreateSolidBrush
CreateRectRgnIndirect
GetTextExtentPoint32A
GetTextMetricsA
CreateCompatibleDC
GetCurrentObject
CreateFontIndirectA
GetObjectA
CreateRoundRectRgn
advapi32
GetUserNameA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHGetSpecialFolderPathA
Shell_NotifyIconA
ShellExecuteA
comctl32
ImageList_GetImageCount
_TrackMouseEvent
ImageList_GetImageInfo
ImageList_Draw
ImageList_GetIconSize
ImageList_GetIcon
ImageList_Remove
ImageList_AddMasked
ole32
CoTaskMemAlloc
CoFreeLibrary
CoLoadLibrary
StgCreateDocfile
StgOpenStorage
CoCreateGuid
CoTaskMemFree
wininet
InternetReadFileExA
InternetSetOptionA
InternetQueryOptionA
HttpQueryInfoA
InternetConnectA
HttpAddRequestHeadersA
HttpSendRequestA
InternetSetStatusCallback
InternetCloseHandle
InternetOpenA
HttpOpenRequestA
InternetErrorDlg
netapi32
Netbios
ws2_32
htonl
WSAStartup
gethostname
gethostbyname
inet_ntoa
WSACleanup
inet_addr
ntohl
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
Sections
.text Size: 212KB - Virtual size: 211KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xue Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE