Static task
static1
Behavioral task
behavioral1
Sample
2e69beaaa1c00e1f59676f389cf85a4b_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2e69beaaa1c00e1f59676f389cf85a4b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2e69beaaa1c00e1f59676f389cf85a4b_JaffaCakes118
-
Size
171KB
-
MD5
2e69beaaa1c00e1f59676f389cf85a4b
-
SHA1
868e293b7f4ddaf79c0eb4e0e06c63c358ea2096
-
SHA256
df35251dde2b373a756b7cf5b9b8cbe26b225c3c0824e22cf42c7094e4693c9f
-
SHA512
f1e1cb2ad6c0e9fc7fa7d539dea44bc1c3eb3939e4a6484c47dbc3c6fbb02d0e7543892da14d00a69859c2bcded9214460a5aa4556dde867f799d50fdf09b175
-
SSDEEP
3072:3yp6GmalgBDKhtgbqjDvj/RJ8KAOxGeW7gxP01voQgcKF8hCk9r+AF70pB0Dc:3057livbqjD77XGT2w76mNDc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e69beaaa1c00e1f59676f389cf85a4b_JaffaCakes118
Files
-
2e69beaaa1c00e1f59676f389cf85a4b_JaffaCakes118.exe windows:4 windows x86 arch:x86
c440c62d74ec5a6600d91ab26032b0bf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
RpcStringBindingComposeW
RpcStringFreeW
RpcSmDestroyClientContext
RpcBindingFromStringBindingW
shell32
SHGetFolderPathW
DragQueryFileW
DragFinish
CommandLineToArgvW
SHFileOperationW
user32
wsprintfA
InvalidateRect
wvsprintfA
UpdateWindow
GetParent
CreateWindowExA
GetDlgItem
LoadStringA
LoadImageA
DestroyIcon
SetWindowTextA
GetWindow
GetWindowTextA
LoadIconA
GetClientRect
MoveWindow
GetWindowLongA
SetWindowLongA
SetWindowPos
GetSystemMetrics
ReleaseCapture
PostMessageA
MessageBoxA
SendMessageA
LoadCursorA
SetCursor
kernel32
GetCurrentDirectoryA
RaiseException
InitializeCriticalSection
FindFirstVolumeW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
lstrcpyA
lstrcmpA
Sleep
CloseHandle
GetProcAddress
GetModuleHandleA
MultiByteToWideChar
GetCurrentThreadId
GetTickCount
GetLastError
lstrlenA
lstrcatA
lstrcpynA
lstrcmpiA
FreeLibrary
LoadLibraryA
MulDiv
GetDiskFreeSpaceA
GetFullPathNameA
FindFirstFileA
WideCharToMultiByte
GetFileAttributesA
GetThreadLocale
VirtualProtect
CreateFileA
ReadFile
FlushFileBuffers
SetStdHandle
LCMapStringW
LCMapStringA
SetFilePointer
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetCPInfo
GetOEMCP
WriteFile
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
HeapSize
GetCurrentProcess
GetModuleFileNameA
GetVersionExA
TerminateProcess
TlsGetValue
TlsSetValue
GetLocaleInfoA
GetACP
InterlockedExchange
GetSystemInfo
SetEndOfFile
TlsFree
SetLastError
TlsAlloc
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
VirtualQuery
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
HeapAlloc
HeapReAlloc
GetCommandLineA
HeapFree
RtlUnwind
gdi32
DeleteObject
DeleteDC
SetBkColor
CreateCompatibleBitmap
DPtoLP
CombineRgn
RestoreDC
CreateCompatibleDC
GetPixel
GetDeviceCaps
SelectObject
CreateBitmap
GetClipBox
BitBlt
SaveDC
SetViewportExtEx
OffsetViewportOrgEx
CreateRectRgn
SetTextColor
PtVisible
GetStockObject
ScaleWindowExtEx
SetBkMode
ScaleViewportExtEx
Escape
RectVisible
SetViewportOrgEx
SetWindowExtEx
SetMapMode
oleaut32
VariantInit
DispGetIDsOfNames
VarUI4FromDec
SetErrorInfo
Sections
.text Size: 107KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ