Static task
static1
Behavioral task
behavioral1
Sample
2c415062974566d31144f8f7278be13f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2c415062974566d31144f8f7278be13f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2c415062974566d31144f8f7278be13f_JaffaCakes118
-
Size
172KB
-
MD5
2c415062974566d31144f8f7278be13f
-
SHA1
2220c0a07144eab837e0894a6de2500055d67318
-
SHA256
7af6f282a3d6ed8c5a1fbbed5bb4458ceba5bf19d4772440f3be7c10273875a0
-
SHA512
d22f2f8847e35321e6338713925546c88057882f4a51a36def59ac77124a6b708e6083fdf8bbb374d83a9f0467ba5b27816fbddab3c34e21e4ea714472683c18
-
SSDEEP
3072:vYtmWIm+DiEZ0xKl7I27lgWc6kCjd3D7aur+1Dyz8jb:gtamMT7P7lvczCjkSw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c415062974566d31144f8f7278be13f_JaffaCakes118
Files
-
2c415062974566d31144f8f7278be13f_JaffaCakes118.exe windows:4 windows x86 arch:x86
0698c7b896f1d350272003644c61e069
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleOutputCharacterA
GetSystemDirectoryA
ReleaseMutex
CopyFileExA
HeapWalk
SetConsoleNumberOfCommandsA
DisconnectNamedPipe
LoadLibraryExW
GetDevicePowerState
FindAtomA
ReadConsoleA
HeapFree
GetModuleHandleA
GetCommState
GetConsoleAliasExesW
LocalHandle
GetModuleFileNameA
GetVersionExA
GetCommTimeouts
ChangeTimerQueueTimer
WriteProfileStringA
ResetEvent
SystemTimeToTzSpecificLocalTime
WriteConsoleOutputA
ReadConsoleInputA
OpenEventA
SetThreadUILanguage
VirtualAllocEx
GetThreadTimes
GetFullPathNameA
GetFileTime
OpenFileMappingA
GetTapeStatus
GetExpandedNameA
SetHandleInformation
GetCPInfoExA
GetFileInformationByHandle
GetLocaleInfoA
SearchPathA
BeginUpdateResourceA
SetConsoleLocalEUDC
BuildCommDCBA
OpenJobObjectA
GetConsoleCP
GetComPlusPackageInstallStatus
GetVolumeInformationA
EnumUILanguagesA
GetCommMask
WaitNamedPipeA
GetNumberFormatA
FindNextVolumeMountPointA
HeapUnlock
GetProcessHeaps
CreateDirectoryA
DeleteTimerQueueTimer
GetConsoleInputExeNameA
CreateTimerQueue
SetCommMask
LoadResource
HeapReAlloc
GetDiskFreeSpaceA
OpenMutexA
ShowConsoleCursor
Sleep
SetEvent
HeapLock
WaitForSingleObject
MoveFileExA
UnregisterWait
SetMessageWaitingIndicator
GetStdHandle
OpenProcess
OpenSemaphoreA
GetNamedPipeHandleStateA
CloseHandle
GetCommandLineA
FlushConsoleInputBuffer
ProcessIdToSessionId
ClearCommBreak
GetConsoleCommandHistoryLengthA
GetSystemDefaultLCID
GetThreadPriority
LZInit
HeapSize
SetPriorityClass
WideCharToMultiByte
ConnectNamedPipe
PrepareTape
GetProfileIntA
GlobalHandle
winmm
timeGetSystemTime
user32
GetMenuBarInfo
DestroyWindow
IsDialogMessageA
GetSystemMetrics
DialogBoxParamA
DefMDIChildProcA
SwitchDesktop
SetActiveWindow
GetAltTabInfoA
GetWindowTextLengthW
IsDlgButtonChecked
GetProgmanWindow
DisplayExitWindowsWarnings
SetMenuItemInfoA
SetWindowWord
SetWindowsHookExW
SetCursorPos
ArrangeIconicWindows
PeekMessageA
DialogBoxIndirectParamA
RegisterShellHookWindow
DestroyCaret
IsCharUpperA
SubtractRect
SetCaretPos
CreateDialogIndirectParamA
DrawCaptionTempA
EnumClipboardFormats
LoadBitmapA
GetProgmanWindow
RegisterLogonProcess
GetKeyboardLayout
GetClassNameA
IsServerSideWindow
DrawTextExA
DefMDIChildProcA
AnyPopup
EnumDisplaySettingsExW
UpdatePerUserSystemParameters
SetShellWindowEx
OpenIcon
MessageBoxExA
GetKeyboardType
MapDialogRect
PostMessageA
GetMenu
LoadMenuA
GetReasonTitleFromReasonCode
ChangeClipboardChain
UpdatePerUserSystemParameters
SetSysColorsTemp
GetClientRect
QuerySendMessage
OemToCharBuffW
UnhookWinEvent
CharNextExA
BeginDeferWindowPos
CreateWindowStationA
CheckMenuItem
SetLastErrorEx
GetAltTabInfo
PeekMessageA
GetMenuItemInfoA
GetSystemMetrics
GetLayeredWindowAttributes
GetClipboardSequenceNumber
SendIMEMessageExA
GetWindowTextA
AdjustWindowRectEx
SendMessageA
GetWindowPlacement
GetWinStationInfo
GetMenuItemRect
GetKeyboardLayout
DrawTextA
LoadKeyboardLayoutEx
CreateWindowStationW
BroadcastSystemMessageA
AdjustWindowRect
LoadMenuIndirectA
LockWindowStation
SystemParametersInfoA
GetKeyboardLayoutNameA
SetTimer
LoadMenuIndirectW
Sections
.idata Size: - Virtual size: 1020B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.itext Size: 156KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ