Static task
static1
Behavioral task
behavioral1
Sample
2e925f14ecdd983a137be16ee13e2b3b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e925f14ecdd983a137be16ee13e2b3b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2e925f14ecdd983a137be16ee13e2b3b_JaffaCakes118
-
Size
4.1MB
-
MD5
2e925f14ecdd983a137be16ee13e2b3b
-
SHA1
fbd0db18871821a5bdc758d165c92beae7f5eab6
-
SHA256
77210cc6e5492864ff6e7aa920adb464206af7d5e229e38f5c32a07cc09a7236
-
SHA512
a88267890ba85b37584e67b4c977d5a63b95f37aabaac9d322dbc7a949ce34eb97b97c6aa669353594ab77601a23e329fc5e85094b9639dabf620a605d1aa321
-
SSDEEP
24576:kPo8v3Ajvk0O9FETsZgWhQIXtmndD1d4k32vBodP+hRs2lFK0R3CxuOrEfcsaEjy:sE7XIrNya8favhgcukjX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e925f14ecdd983a137be16ee13e2b3b_JaffaCakes118
Files
-
2e925f14ecdd983a137be16ee13e2b3b_JaffaCakes118.exe windows:5 windows x86 arch:x86
9b5046987f39055545441913f69d8761
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
WriteConsoleW
SetStdHandle
GetStringTypeW
LoadLibraryW
CloseHandle
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
GetSystemTimeAsFileTime
DeleteCriticalSection
EncodePointer
DecodePointer
RtlUnwind
GetCommandLineA
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetTickCount
GetModuleHandleW
GetProcAddress
CreateSemaphoreW
GetLastError
CreateThread
ExitThread
LoadLibraryExW
RaiseException
HeapFree
CreateTimerQueue
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
GetModuleFileNameA
WriteFile
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsDebuggerPresent
HeapAlloc
HeapSize
OutputDebugStringW
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleHandleA
GetVersionExW
VirtualFree
VirtualProtect
ReleaseSemaphore
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
HeapReAlloc
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
LCMapStringW
CreateFileW
comdlg32
GetFileTitleW
CommDlgExtendedError
ChooseFontW
ReplaceTextW
FindTextW
GetSaveFileNameW
ChooseColorW
wintrust
CryptCATAdminEnumCatalogFromHash
CryptCATAdminAcquireContext
CryptCATCatalogInfoFromContext
Sections
.text Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 7.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.5asmr2 Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE