Static task
static1
Behavioral task
behavioral1
Sample
2b82e5a3b51991cb115a58b60de53cfe_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2b82e5a3b51991cb115a58b60de53cfe_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2b82e5a3b51991cb115a58b60de53cfe_JaffaCakes118
-
Size
512KB
-
MD5
2b82e5a3b51991cb115a58b60de53cfe
-
SHA1
a5a90fb05f3d24e176e348eba212c2b57ddee8f8
-
SHA256
acd3f019054eb89176359b677fcc086a3bf89543965b58a4f7a652ffea5345e8
-
SHA512
518e0705c962fc7b4262e703c8f0dd031d17bae54ca26b1855be98b358a4d5c5d9203057589841e8335be16ba0185fda31e8fb68e3e87bd8196873236b47e5ca
-
SSDEEP
6144:aEsnoDf/J7y70o1Wyay0Adr4kYsANWAiB+9jCCz:aEUgh7y7gJAmkY5NWAiB+9jCe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b82e5a3b51991cb115a58b60de53cfe_JaffaCakes118
Files
-
2b82e5a3b51991cb115a58b60de53cfe_JaffaCakes118.exe windows:4 windows x86 arch:x86
6e4a892f69526b5dc09bc408a7e2a681
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
CreateFileA
ExitProcess
GetLogicalDriveStringsA
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
CloseHandle
VirtualAllocEx
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetModuleFileNameA
GetComputerNameA
GetModuleHandleA
LoadLibraryA
GetProcAddress
Sleep
GetCurrentDirectoryA
GetFullPathNameA
FindFirstFileA
GetDriveTypeA
WideCharToMultiByte
MultiByteToWideChar
RtlUnwind
RaiseException
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetCommandLineA
GetVersion
TerminateProcess
GetCurrentProcess
LCMapStringA
LCMapStringW
DebugBreak
GetStdHandle
InterlockedDecrement
OutputDebugStringA
InterlockedIncrement
GetCPInfo
CompareStringA
CompareStringW
GetLastError
GetFileAttributesA
HeapFree
SetUnhandledExceptionFilter
HeapAlloc
HeapReAlloc
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
SetFilePointer
FlushFileBuffers
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
GetVersionExA
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
SetConsoleCtrlHandler
GetExitCodeProcess
CreateProcessA
IsBadCodePtr
GetACP
GetOEMCP
ReadFile
SetStdHandle
SetEnvironmentVariableA
GetLocaleInfoW
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
SetCurrentDirectoryA
advapi32
RegEnumValueA
RegCloseKey
RegOpenKeyExA
wininet
InternetConnectA
FtpPutFileA
InternetOpenA
Sections
.text Size: 440KB - Virtual size: 436KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ