Static task
static1
Behavioral task
behavioral1
Sample
2efa4ce347d601f77f8d4346cf309c18_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2efa4ce347d601f77f8d4346cf309c18_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2efa4ce347d601f77f8d4346cf309c18_JaffaCakes118
-
Size
2.5MB
-
MD5
2efa4ce347d601f77f8d4346cf309c18
-
SHA1
becda100d37e0d363adfcf140cfe9597f76aa37f
-
SHA256
79652c15055a054efc1756b5eccef7861f708599002f7e464170cc51ae01c5ff
-
SHA512
8d863a6b82d7e4633da7ee419bdff158d15146b30175083fd6b9ae16f3a783060dfa21df2969faaa94c4dc29c3d13ca3084889d5682a33ff42b573050f7349ac
-
SSDEEP
49152:ifp8TAYbVDwuqxEkEaUvihE4h/rF7zGVh8PRlWjgqzEKWOUzdbKS:ifp8TAYVDwuqxEkEaUv0E4h/rhGE3LEa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2efa4ce347d601f77f8d4346cf309c18_JaffaCakes118
Files
-
2efa4ce347d601f77f8d4346cf309c18_JaffaCakes118.exe windows:4 windows x86 arch:x86
0f1a1e29ec5328671d3e6395bc8f8de8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCurrentDirectoryA
GetSystemDirectoryA
GetCommandLineA
QueryPerformanceCounter
QueryPerformanceFrequency
CloseHandle
InterlockedIncrement
GetEnvironmentVariableA
GetCurrentProcessId
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
IsBadCodePtr
IsBadReadPtr
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetOEMCP
GetACP
GetCPInfo
HeapSize
RaiseException
UnhandledExceptionFilter
GetFullPathNameA
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
SetLastError
HeapDestroy
SetEndOfFile
SetFilePointer
GetStdHandle
SetHandleCount
SetStdHandle
TlsGetValue
TlsAlloc
GetCurrentThreadId
GetVersion
GetStartupInfoA
GetCurrentThread
DuplicateHandle
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InterlockedDecrement
GetModuleFileNameA
SetUnhandledExceptionFilter
LoadLibraryA
GetProcAddress
FreeLibrary
InitializeCriticalSection
GetCurrentProcess
ReadProcessMemory
VirtualQuery
GlobalFree
GetModuleHandleA
TerminateProcess
ExitProcess
FindNextFileA
MoveFileA
GetSystemTime
GetTimeZoneInformation
ExitThread
TlsSetValue
CreateThread
ResumeThread
FlushFileBuffers
FindFirstFileA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
HeapAlloc
GetFileType
RtlUnwind
IsProcessorFeaturePresent
HeapFree
GlobalAlloc
SetFileAttributesA
CopyFileA
lstrlenA
OutputDebugStringA
GetLastError
GetLocalTime
GetCurrentDirectoryA
FindResourceA
LoadResource
SizeofResource
LockResource
Sleep
MultiByteToWideChar
DeleteFileA
lstrcpyA
lstrcatA
UnmapViewOfFile
CreateFileW
WriteFile
CreateFileA
ReadFile
WideCharToMultiByte
GetVersionExA
HeapCreate
user32
FillRect
CallNextHookEx
GetAsyncKeyState
SetWindowsHookExA
UnhookWindowsHookEx
MessageBoxA
GetClientRect
GetWindowRect
SendMessageA
ChangeDisplaySettingsA
EnumDisplaySettingsA
SetWindowTextA
CharNextA
SetWindowPos
SetWindowLongA
ShowWindow
ReleaseDC
GetDC
wsprintfA
PostMessageA
GetKeyState
PtInRect
SetFocus
GetWindowTextA
GetWindowLongA
IntersectRect
SetRect
CreateWindowExA
AdjustWindowRect
RegisterClassA
LoadIconA
SetCursor
LoadCursorA
DestroyAcceleratorTable
UpdateWindow
CharPrevA
GetClassLongA
FindWindowA
LoadBitmapA
DefWindowProcA
GetKeyboardLayoutNameA
GetFocus
DestroyWindow
PostQuitMessage
LoadAcceleratorsA
PeekMessageA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
gdi32
GetTextExtentPoint32A
SetBkMode
TextOutA
DeleteDC
GetDeviceCaps
CreateDCA
SetDeviceGammaRamp
SetBkColor
StretchBlt
GetStockObject
DeleteObject
CreateCompatibleDC
CreateDIBSection
CreateFontA
SelectObject
SetTextColor
shell32
ShellExecuteA
ole32
OleSetContainedObject
OleInitialize
OleUninitialize
CoUninitialize
CoInitialize
CoCreateInstance
OleCreate
d3d8
Direct3DCreate8
winmm
mmioClose
mmioOpenA
timeGetTime
mmioRead
mmioDescend
mmioGetInfo
mmioCreateChunk
mmioSeek
mmioSetInfo
mmioAdvance
mmioWrite
mmioAscend
imm32
ImmGetDefaultIMEWnd
ImmReleaseContext
ImmAssociateContext
ImmDestroyContext
ImmGetConversionStatus
ImmGetContext
ImmSetConversionStatus
ImmGetOpenStatus
ImmSetOpenStatus
ImmGetCompositionStringA
ImmGetCandidateListA
ImmCreateContext
dinput8
DirectInput8Create
dsound
ord11
wsock32
WSAStartup
WSAAsyncSelect
bind
htons
gethostname
socket
send
WSAGetLastError
connect
ioctlsocket
closesocket
recv
listen
iphlpapi
GetAdaptersInfo
msvfw32
MCIWndCreateA
oleaut32
VariantInit
SysAllocString
VariantClear
wininet
InternetOpenUrlA
InternetOpenA
FindCloseUrlCache
FindNextUrlCacheEntryA
InternetCloseHandle
InternetReadFile
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
advapi32
RegOpenKeyA
RegCloseKey
RegQueryValueExA
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 14.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ultra Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ