Static task
static1
Behavioral task
behavioral1
Sample
2df9e77208c9c25d1afa343b6408a5a6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2df9e77208c9c25d1afa343b6408a5a6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2df9e77208c9c25d1afa343b6408a5a6_JaffaCakes118
-
Size
171KB
-
MD5
2df9e77208c9c25d1afa343b6408a5a6
-
SHA1
ed46d135b3fe60627a8281aea39ef3219caa7f27
-
SHA256
5db6fbcb6a06909f2c7ab5e9c4d193759962679cf3805ea301db07747c6b7a7c
-
SHA512
b8190fba19096c492215583e0037eaa66a77fd4d1da27fdf322f07f8c62a83f79230f28f34d11bd92e7f91e50e3848c1eece60bb964c435a72bf68305dec457e
-
SSDEEP
3072:lrI/JcoUmdq5YMGakf027Hc4o9WF4tWDznE2pTIIPai:+/W6472s2TNagDvJa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2df9e77208c9c25d1afa343b6408a5a6_JaffaCakes118
Files
-
2df9e77208c9c25d1afa343b6408a5a6_JaffaCakes118.exe windows:4 windows x86 arch:x86
a3535cfa2aec97fc9cbdaa49913ac3e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHFileOperationA
SHGetSpecialFolderLocation
SHGetFolderPathA
SHGetFileInfoA
SHGetDiskFreeSpaceA
kernel32
GetUserDefaultLCID
GetDiskFreeSpaceA
CreateFileA
FindFirstFileA
FreeResource
EnterCriticalSection
GlobalAddAtomA
CompareStringA
GlobalAlloc
MulDiv
GetLocaleInfoA
lstrcpynA
DeleteCriticalSection
GetLastError
lstrlenA
GetFullPathNameA
VirtualAllocEx
GetCurrentThread
FreeLibrary
GetCurrentThreadId
GetCurrentProcessId
GetModuleFileNameA
GetModuleHandleA
Sleep
GetVersion
GetCPInfo
GetEnvironmentStrings
SetThreadLocale
LoadResource
SetEndOfFile
WaitForSingleObject
InitializeCriticalSection
GetTickCount
ExitProcess
DeleteFileA
MoveFileA
GetDateFormatA
GlobalFindAtomA
CreateThread
MoveFileExA
VirtualQuery
lstrcmpA
CreateEventA
GetStdHandle
ResetEvent
GetProcessHeap
FindClose
SetHandleCount
WideCharToMultiByte
LoadLibraryExA
FindResourceA
SetFilePointer
HeapAlloc
LockResource
lstrcatA
LocalAlloc
GetFileAttributesA
VirtualAlloc
GetACP
SetLastError
LocalFree
GetOEMCP
ExitThread
GetCurrentProcess
CloseHandle
LoadLibraryA
version
VerInstallFileA
ole32
CLSIDFromProgID
CoGetMalloc
CoTaskMemFree
MkParseDisplayName
CoRevokeClassObject
CoCreateInstanceEx
CoRegisterClassObject
CoUnmarshalInterface
WriteClassStm
CoGetContextToken
user32
GetMenuItemCount
FindWindowA
IsChild
GetMenuState
GetClipboardData
GetMenuStringA
EnableMenuItem
GetWindow
GetMenuItemInfoA
GetSysColor
GetScrollPos
GetParent
GetDCEx
CreateIcon
ShowScrollBar
GetIconInfo
GetScrollRange
GetCursor
GetMessagePos
DispatchMessageW
DeferWindowPos
SetWindowLongA
ClientToScreen
GetScrollInfo
GetPropA
GetClientRect
GetClassLongA
GetMenu
GetDlgItem
GetSysColorBrush
GetWindowTextA
DefMDIChildProcA
GetMenuItemID
GetSubMenu
SetWindowPos
FrameRect
SetWindowTextA
IsMenu
GetClassInfoA
msvcrt
memcpy
memmove
atan
strcmp
atol
shlwapi
SHGetValueA
PathIsDirectoryA
SHDeleteValueA
SHQueryValueExA
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 113KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 453B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE