Static task
static1
Behavioral task
behavioral1
Sample
2bd63e9fa6996bd81ae01175034a51e5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2bd63e9fa6996bd81ae01175034a51e5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2bd63e9fa6996bd81ae01175034a51e5_JaffaCakes118
-
Size
308KB
-
MD5
2bd63e9fa6996bd81ae01175034a51e5
-
SHA1
8ed954f41d6e8f90c591ceb77b4eaac66e475aaf
-
SHA256
39f79a1570c1edd57abc26fff41d8815f1da51352a1ebdbfc14f5f6041bac136
-
SHA512
4d768c2e9e1f84986bf4cedd40ffd55d50a7bb2068bc68cbcdb913a039e7c8e2379b8985a647c157e638947cf3fb8e0567c7841eeca75e6b15377f123ec8d311
-
SSDEEP
6144:ChxKjnj+RSjsfs3NKfUw5jDQAG1Dmk8j3avE:ChsnCfs3NYpx0hmky9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2bd63e9fa6996bd81ae01175034a51e5_JaffaCakes118
Files
-
2bd63e9fa6996bd81ae01175034a51e5_JaffaCakes118.exe windows:5 windows x86 arch:x86
bac955a3525d44e6a65595e6135c06ad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
TranslateMessage
SetWindowLongA
PeekMessageA
MsgWaitForMultipleObjects
LoadStringA
ExitWindowsEx
DispatchMessageA
DestroyWindow
CreateWindowExA
CharPrevA
MessageBoxA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
RegisterClassA
TrackPopupMenu
WaitForInputIdle
GetProcessDefaultLayout
RegisterHotKey
DialogBoxParamA
GetIconInfo
EmptyClipboard
DrawIconEx
EndMenu
EnumClipboardFormats
CopyImage
DrawFocusRect
IsWinEventHookInstalled
advapi32
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
RegEnumValueA
RegEnumKeyA
RegSetValueExA
RegQueryValueExA
RegCloseKey
gdi32
SelectClipRgn
SetPixel
CopyMetaFileW
OffsetWindowOrgEx
SetTextJustification
CloseFigure
SetPaletteEntries
AbortDoc
SetAbortProc
GetEnhMetaFilePixelFormat
TextOutW
GetTextFaceA
SelectObject
SetTextColor
SetBkMode
CreateFontIndirectA
CreateBrushIndirect
DeleteObject
GetDeviceCaps
GetStockObject
SetBkColor
kernel32
GetEnvironmentStrings
FreeEnvironmentStringsA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
FreeEnvironmentStringsW
GetCurrentThreadId
TlsFree
TlsAlloc
GetModuleHandleW
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetVersion
GetFileAttributesExW
CreateIoCompletionPort
GetStdHandle
SetHandleCount
MulDiv
GetModuleFileNameW
GetTempPathA
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
SetFilePointer
ReadFile
WriteFile
GetPrivateProfileStringA
WritePrivateProfileStringA
MultiByteToWideChar
FreeLibrary
GetProcAddress
LoadLibraryExA
GetModuleHandleA
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
GlobalFree
ExpandEnvironmentStringsA
lstrcmpA
lstrcmpiA
CloseHandle
GetSystemDirectoryA
lstrcatA
lstrlenA
CreateFileA
ExitProcess
GetFileType
GetSystemTime
GetFileSize
RaiseException
RtlUnwind
SetEndOfFile
GetCommandLineA
GetLastError
TlsGetValue
TlsSetValue
WideCharToMultiByte
LocalAlloc
LocalFree
VirtualAlloc
VirtualFree
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CreateDirectoryA
CreateProcessA
FindResourceA
FormatMessageA
GetACP
GetCurrentProcess
GetEnvironmentVariableA
GetFileAttributesA
GetFullPathNameA
GetLocaleInfoA
GetModuleFileNameA
GetSystemDefaultLCID
GetSystemInfo
GetUserDefaultLangID
GetVersionExA
GetWindowsDirectoryA
IsDBCSLeadByte
LoadLibraryA
LoadResource
LockResource
RemoveDirectoryA
SetErrorMode
SetLastError
SizeofResource
Sleep
VirtualProtect
VirtualQuery
HeapReAlloc
HeapAlloc
GetStartupInfoA
HeapCreate
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
Sections
.text Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
sdfvsczx Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text5 Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
atoi Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
exit Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
atexit Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cctype Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ