Static task
static1
Behavioral task
behavioral1
Sample
2e329748735f9de6abdad308d995326a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2e329748735f9de6abdad308d995326a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2e329748735f9de6abdad308d995326a_JaffaCakes118
-
Size
212KB
-
MD5
2e329748735f9de6abdad308d995326a
-
SHA1
3c06a119648460840cfe2726b493dfcc205fc0d0
-
SHA256
8086922ac3f62d498265151a2aab0a5418aa2e2bcc0c0dbec5af60981f073498
-
SHA512
81d02c35c896f3c0ca2cd86b1884e9dfe4df6777882ca324cdee310da81906cb5cd739ab5880cb411e8c375b568b81de11d6f6ba7e5b34675d9c2920ef83c9c8
-
SSDEEP
3072:ttf18giGtpKIlgTDEfuIEzRdrZ9r8viQ0:7qIlgHEfeZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e329748735f9de6abdad308d995326a_JaffaCakes118
Files
-
2e329748735f9de6abdad308d995326a_JaffaCakes118.exe windows:5 windows x86 arch:x86
87d676e59176d927bef6e932d7533efb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Module32Next
SetProcessPriorityBoost
GetSystemTime
Thread32Next
Process32First
GetLocalTime
GetCurrentProcess
CloseHandle
GetCurrentThreadId
CreateMutexW
GetCurrentThread
GetCurrentProcessId
WriteFile
GetProcessHeap
SetFileAttributesW
GetSystemWindowsDirectoryW
CreateFileA
CreateMutexA
OutputDebugStringA
GetModuleHandleA
VirtualAlloc
WaitForSingleObject
CreateEventA
GetProcAddress
LoadLibraryA
IsBadReadPtr
VirtualProtect
VirtualProtectEx
VirtualFree
SleepEx
SystemTimeToFileTime
WaitForMultipleObjects
lstrcpyW
GetThreadPriorityBoost
user32
GetCursor
CloseClipboard
GetDC
IsWindow
DestroyWindow
GetCursorInfo
GetCursorPos
DispatchMessageA
TranslateMessage
GetMessageA
UpdateWindow
ShowWindow
MessageBoxA
CreateWindowExA
RegisterClassA
LoadCursorA
LoadIconA
advapi32
CryptGenRandom
CryptAcquireContextA
CryptReleaseContext
Sections
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hjemikt Size: 4KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
phlvzbf Size: 4KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
iqtbzxu Size: 23KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mgzuibh Size: 4KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sfujiep Size: 4KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gewidlw Size: 4KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xkzrdku Size: 27KB - Virtual size: 80KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE