Static task
static1
Behavioral task
behavioral1
Sample
2e10fcf67e7ed1e40fb3b92a2bc18fac_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e10fcf67e7ed1e40fb3b92a2bc18fac_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2e10fcf67e7ed1e40fb3b92a2bc18fac_JaffaCakes118
-
Size
179KB
-
MD5
2e10fcf67e7ed1e40fb3b92a2bc18fac
-
SHA1
62577dcabbe1118acc7ade340c55658ddc51628d
-
SHA256
ba7aae2cd1b654ff47b04aafde522d5b185ea1f4e29490967975a49b095d2c2c
-
SHA512
009b18f1c35d7f982f7cd8b547b5f499a9e52016a685804f55559553a0dcc15e5c27c70144860013c20002491c7dd008855549755896869d4b80a9fba951a624
-
SSDEEP
3072:o8Y7iRYc+tj8NMLrlLV1/brRo6Q0wXThwIZIlgKlG6xKbtPuh2w:tbIV8eLrlLF/Q9hpZIKK1Ibgh5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e10fcf67e7ed1e40fb3b92a2bc18fac_JaffaCakes118
Files
-
2e10fcf67e7ed1e40fb3b92a2bc18fac_JaffaCakes118.exe windows:5 windows x86 arch:x86
e0ccb20996501f4a81e7b01e587adfb0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CompareStringW
FlushFileBuffers
WriteConsoleW
HeapReAlloc
HeapSize
RtlUnwind
GetTimeZoneInformation
ReadFile
GetProcessHeap
SetEndOfFile
SetFilePointer
GetConsoleMode
GetConsoleCP
SetStdHandle
lstrcpyA
GetLastError
GetStringTypeW
MultiByteToWideChar
LCMapStringW
RaiseException
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapCreate
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameA
GetModuleFileNameW
GetStdHandle
WriteFile
GetSystemTime
CloseHandle
GetModuleHandleA
SetCurrentDirectoryW
LoadLibraryA
GetProcAddress
lstrcatA
Sleep
GetCurrentProcess
LoadLibraryW
HeapAlloc
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
FindFirstFileExW
GetSystemTimeAsFileTime
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
EncodePointer
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetFullPathNameW
GetFileInformationByHandle
PeekNamedPipe
GetFileType
CreateFileW
GetCurrentDirectoryW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEnvironmentVariableA
user32
EndPaint
DestroyWindow
GetWindowRect
DrawTextA
GetClientRect
SetFocus
SendMessageA
BeginPaint
EnumWindows
wsprintfW
GetDC
GetMenu
LoadIconW
MessageBoxA
InvalidateRect
ChangeClipboardChain
GetDlgItem
DefWindowProcA
GetSysColor
GetCursorPos
ShowWindow
CreatePopupMenu
CreateDialogParamW
AppendMenuA
GetSystemMetrics
FindWindowA
LoadCursorA
SetWindowTextW
SetClipboardViewer
MoveWindow
gdi32
ExtFloodFill
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
CreateSolidBrush
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorW
shell32
ShellExecuteW
comctl32
ord17
Sections
.text Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ