Static task
static1
Behavioral task
behavioral1
Sample
2e8dc1872d68c18107084c101e9d07d7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e8dc1872d68c18107084c101e9d07d7_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2e8dc1872d68c18107084c101e9d07d7_JaffaCakes118
-
Size
580KB
-
MD5
2e8dc1872d68c18107084c101e9d07d7
-
SHA1
5182e7cf8e00ea074cc0777796419648beb917bd
-
SHA256
123095fe600ac7ac2ed55a1a96bb60721746f74a677f5fe625e872d987078a61
-
SHA512
b4c43636259caa7e85407af1abbbc406d8d428b13de1d5ec6c2bf4855e7189cf4908c1224998bbe5a6ac50f735e0f1b9e6209b960e5fc6a032b54957fe5a25b3
-
SSDEEP
6144:vc5GXcgQOxRDVG0ArbXviexc0KocfS/kie5G2SicNZvPCrxhHUq1OYXvdd8WN9G:VXcyRD+rb92GLicNZSrxh0gOYXvd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e8dc1872d68c18107084c101e9d07d7_JaffaCakes118
Files
-
2e8dc1872d68c18107084c101e9d07d7_JaffaCakes118.exe windows:4 windows x86 arch:x86
61df98bd75373cf8b9e5a05d062e0ec6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpA
GetModuleHandleA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
GlobalFlags
GetCPInfo
GetOEMCP
ExitProcess
GetTimeZoneInformation
GetSystemTime
GetLocalTime
RtlUnwind
GetCommandLineA
SetStdHandle
GetFileType
HeapAlloc
HeapFree
RaiseException
GetACP
HeapSize
HeapReAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetStartupInfoA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
Sleep
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetCurrentThreadId
GetVersion
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalAlloc
GlobalReAlloc
GlobalLock
GlobalHandle
GlobalUnlock
GlobalFree
TlsAlloc
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcatA
SetLastError
GetFileTime
GetFileSize
GetFileAttributesA
lstrcmpiA
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
InterlockedExchange
FindFirstFileA
FindClose
lstrcpyA
SetEndOfFile
UnlockFile
LockFile
CloseHandle
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
GetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalFree
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameA
LoadLibraryA
GetProcAddress
FreeLibrary
GetThreadContext
VirtualAllocEx
WriteProcessMemory
TerminateProcess
WaitForSingleObject
GetShortPathNameA
GetTempPathA
CopyFileA
CreateProcessA
user32
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
GetTopWindow
GetClientRect
CopyRect
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
DispatchMessageA
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetCapture
WinHelpA
GetWindowLongA
SendMessageA
MessageBoxA
EnableWindow
UnhookWindowsHookEx
GetSystemMetrics
CharUpperA
LoadStringA
IsIconic
gdi32
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
RestoreDC
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SaveDC
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
comctl32
ord17
shlwapi
StrToIntExA
Sections
.text Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 448KB - Virtual size: 461KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ