Static task
static1
Behavioral task
behavioral1
Sample
2ed0cb36b5f2e5afb775a6aa0da39158_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2ed0cb36b5f2e5afb775a6aa0da39158_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2ed0cb36b5f2e5afb775a6aa0da39158_JaffaCakes118
-
Size
162KB
-
MD5
2ed0cb36b5f2e5afb775a6aa0da39158
-
SHA1
831c170bc5bda71a6cb86be0de299c4f55115f24
-
SHA256
eda4dcb01ebc1aad134e1fafdb628c08902537d859a3b5a1360bc3b89b6c97fe
-
SHA512
3fe8907328595f4a2dbccabd60bc2af5dc005cf65ae2abfa2b9eee711f96afb6129e584abdc8917640733cb96eb51f03f9a70ba23153e07cbe96eeaddbd6db3b
-
SSDEEP
3072:AT27KIdhpXbX7gB+1AWjVCCjaN6PBS20/Edg+OYoPuitUjlS8YL79J5qUbkun:E2eIzdXrbaN6I60Y7iKjlw79Joon
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ed0cb36b5f2e5afb775a6aa0da39158_JaffaCakes118
Files
-
2ed0cb36b5f2e5afb775a6aa0da39158_JaffaCakes118.exe windows:4 windows x86 arch:x86
840553b1553a72746a3d51e659cbc0fb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
LookupAccountSidA
OpenServiceA
QueryServiceConfig2A
RegCloseKey
RegQueryInfoKeyA
RegQueryValueA
RegisterServiceCtrlHandlerA
SetSecurityDescriptorDacl
SetServiceStatus
kernel32
CloseHandle
CreateEventA
CreateFileMappingA
CreateThread
DeleteCriticalSection
DeviceIoControl
EnterCriticalSection
ExitProcess
ExitThread
FindFirstFileA
FindNextFileA
FlushFileBuffers
FormatMessageA
FreeLibrary
GetACP
GetCommandLineA
GetConsoleCP
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetEnvironmentStringsA
GetFileTime
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetPrivateProfileStructA
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetSystemDirectoryA
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetTimeZoneInformation
GetUserDefaultLCID
GetVersionExA
GetWindowsDirectoryA
GlobalUnlock
HeapAlloc
HeapDestroy
HeapFree
HeapSize
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadCodePtr
IsValidLocale
LCMapStringA
LoadLibraryA
LocalAlloc
LocalFree
LockResource
MoveFileA
MoveFileExA
MulDiv
OpenProcess
ReadFile
ReadProcessMemory
ReleaseMutex
RemoveDirectoryA
ResetEvent
RtlUnwind
SetEnvironmentVariableA
SetLastError
SetPriorityClass
SetUnhandledExceptionFilter
SystemTimeToFileTime
TlsAlloc
TlsFree
UnhandledExceptionFilter
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WritePrivateProfileStringA
lstrcmpiA
lstrcpynA
lstrlenA
user32
BeginPaint
CharPrevA
CharUpperA
CheckMenuItem
ClientToScreen
CreatePopupMenu
DestroyIcon
DispatchMessageA
EndPaint
GetCursorPos
GetDlgCtrlID
GetMessageA
GetSystemMetrics
GetWindowDC
GetWindowThreadProcessId
IsIconic
IsWindowVisible
KillTimer
LoadStringA
MessageBoxA
MsgWaitForMultipleObjects
PostQuitMessage
RegisterClassA
RegisterClassExA
RegisterClipboardFormatA
SendMessageA
SetWindowLongA
TranslateMessage
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 27KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.DATA Size: 110KB - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ