Static task
static1
Behavioral task
behavioral1
Sample
2f3b11ccb45cd8c48a3d125af194c840_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f3b11ccb45cd8c48a3d125af194c840_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2f3b11ccb45cd8c48a3d125af194c840_JaffaCakes118
-
Size
305KB
-
MD5
2f3b11ccb45cd8c48a3d125af194c840
-
SHA1
13ec5607238bcd4660c57c1a50bd267c63565343
-
SHA256
ed9fb7411e1b506e46d2566f32b86bd5b0a30351288480c2dbb465838ffdd314
-
SHA512
90f510b3a983677288b31340262d8bf7c3541a3a51fe2f4673cd037f3ed0325057a52498bec91ca03314c975f5fa0118b37c148e871c7354394fbd859af5d49a
-
SSDEEP
3072:WrAdPBoUyxX0+AR7092SSh3fxEfYGEMiME9gHA5VZR8FPFeOLiaI0lttGIZjOqHL:JjyVdARQjSdfZaiv9HVcFbtjOqR71g0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f3b11ccb45cd8c48a3d125af194c840_JaffaCakes118
Files
-
2f3b11ccb45cd8c48a3d125af194c840_JaffaCakes118.exe windows:4 windows x86 arch:x86
9980a4c28a19d632e92bd7dc0717c4ae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
Sleep
InterlockedExchange
HeapSetInformation
LocalAlloc
LocalFree
GetLocaleInfoA
lstrlenW
lstrcpynW
UnhandledExceptionFilter
GetModuleHandleW
GetProcAddress
InterlockedIncrement
GetLastError
OutputDebugStringA
InterlockedDecrement
HeapFree
GetProcessHeap
HeapAlloc
IsDBCSLeadByte
FormatMessageA
lstrcatA
lstrcmpiA
CompareStringA
GlobalFree
lstrcpyA
GetModuleHandleA
GetLocaleInfoW
CompareStringW
GetUserDefaultUILanguage
GetCommandLineA
VirtualProtect
VirtualFree
LoadLibraryA
VirtualAlloc
GetStartupInfoA
user32
DefDlgProcA
LoadStringA
GetWindowTextA
LoadCursorW
RegisterClassW
EndDialog
GetWindowLongW
SetWindowLongW
SendMessageW
DestroyIcon
GetWindow
DestroyWindow
IsCharAlphaA
IsCharAlphaNumericA
CallWindowProcA
GetWindowLongA
MessageBoxIndirectA
DialogBoxParamA
CharNextA
LoadIconA
VkKeyScanA
MessageBeep
SetWindowTextA
GetWindowTextLengthA
WinHelpA
SetWindowLongA
ShowWindow
GetClassNameW
PostMessageW
LoadStringW
EnableWindow
GetDlgItem
MsgWaitForMultipleObjects
PeekMessageW
DispatchMessageW
CreateWindowExW
IsWindow
SendMessageA
advapi32
RegOpenKeyExW
RegCreateKeyExW
RegSetValueExW
RegQueryValueExA
RegCloseKey
gdi32
GetStockObject
ole32
CoUninitialize
CoMarshalInterThreadInterfaceInStream
CoQueryProxyBlanket
OleRun
CoCreateInstance
CoTaskMemFree
msvcr71
__p__commode
__getmainargs
_acmdln
_ismbblead
_exit
_c_exit
_wcsicmp
malloc
memcpy
_XcptFilter
free
_adjust_fdiv
_cexit
_amsg_exit
_initterm
_wcmdln
exit
_except_handler3
__p__fmode
__set_app_type
__dllonexit
_onexit
_controlfp
__setusermatherr
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 272KB - Virtual size: 272KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 270KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxdata Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ