Static task
static1
Behavioral task
behavioral1
Sample
2e5da86a1a11489d7ae10876b1e65225_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e5da86a1a11489d7ae10876b1e65225_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2e5da86a1a11489d7ae10876b1e65225_JaffaCakes118
-
Size
244KB
-
MD5
2e5da86a1a11489d7ae10876b1e65225
-
SHA1
6ed6b3dc2895e0a838fbf8042ea9f495b68be7e5
-
SHA256
b9a02dfe8e912e004c27640e5abef1a9c9950d1cc0b5405e34d228a3124a86d1
-
SHA512
f9a0b53d89a35a2f4b8889771075fe0ca75e021654d34ecd3fdf03463a0c42afcda11fec57ea5d81a6a6f07db4e37e6c164ee0072011113fba4c9283bff49fe9
-
SSDEEP
3072:Z9E83GvJFgmldk35/RIxQwPntqdaCJzrUQy/sGz3/gTEzo1G4hCRzIzGabFvEWtu:Z9YhFgmldk3hRyQWtqdFJLyk51wu/4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e5da86a1a11489d7ae10876b1e65225_JaffaCakes118
Files
-
2e5da86a1a11489d7ae10876b1e65225_JaffaCakes118.exe windows:4 windows x86 arch:x86
13dcf468a733c5fd7a561fd01d0033db
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetFolderPathA
SHGetSpecialFolderPathA
shlwapi
PathGetArgsA
PathAppendA
SHGetValueA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFileExistsA
PathIsDirectoryA
iphlpapi
GetAdaptersInfo
kernel32
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
SetStdHandle
SetHandleCount
ReadFile
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
InitializeCriticalSection
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteFile
GetLocaleInfoA
SetEndOfFile
SetEnvironmentVariableA
LocalFree
FormatMessageA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
FindClose
FindNextFileA
FindFirstFileA
GlobalGetAtomNameA
LockFile
UnlockFile
GetFileSize
GetThreadLocale
DuplicateHandle
GetFullPathNameA
LocalAlloc
GlobalReAlloc
GlobalHandle
LocalReAlloc
lstrcmpA
GetFileTime
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalFlags
GetCurrentDirectoryA
HeapCreate
HeapDestroy
VirtualFree
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoA
GetProcessHeap
GetCommandLineA
RaiseException
GetFileType
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
RtlUnwind
GetModuleHandleA
VirtualAlloc
HeapReAlloc
HeapFree
HeapAlloc
OutputDebugStringA
RemoveDirectoryA
Sleep
CreateMutexA
GetSystemTimeAsFileTime
SystemTimeToFileTime
ExitProcess
GetTempPathA
CopyFileA
SetCurrentDirectoryA
SetLastError
GetVolumeInformationA
GetComputerNameA
DeleteFileA
GetFileAttributesA
GetVersionExA
GetCurrentProcess
SetPriorityClass
GetModuleFileNameA
GetShortPathNameA
CreateFileA
DeviceIoControl
lstrlenA
lstrcmpiA
CompareStringW
CompareStringA
GetVersion
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
WaitForSingleObject
TerminateProcess
OpenProcess
CloseHandle
FreeLibrary
LoadLibraryA
GetProcAddress
GetDriveTypeA
user32
DestroyMenu
PostQuitMessage
SetWindowTextA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
GrayStringA
DrawTextExA
DrawTextA
EnableWindow
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
SendMessageA
GetKeyState
PeekMessageA
TabbedTextOutA
ClientToScreen
UnregisterClassA
GetClientRect
PostMessageA
FindWindowExA
GetWindowThreadProcessId
EnumWindows
CharUpperA
SendMessageTimeoutA
RegisterWindowMessageA
ValidateRect
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
MessageBoxA
FindWindowA
GetDesktopWindow
GetWindow
GetWindowTextA
gdi32
RestoreDC
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
SaveDC
GetStockObject
DeleteObject
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
SetViewportOrgEx
SelectObject
ExtTextOutA
GetDeviceCaps
TextOutA
RectVisible
PtVisible
SetMapMode
Escape
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegDeleteKeyA
RegSetValueExA
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 176KB - Virtual size: 175KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ