Static task
static1
Behavioral task
behavioral1
Sample
2fc27d586ba99e69ad0ab0c1b3cb4482_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2fc27d586ba99e69ad0ab0c1b3cb4482_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2fc27d586ba99e69ad0ab0c1b3cb4482_JaffaCakes118
-
Size
128KB
-
MD5
2fc27d586ba99e69ad0ab0c1b3cb4482
-
SHA1
9cbcfeeed149b9899eeeacf326765d35eaff3d77
-
SHA256
144584f100fd27579c7a620d4cca38741d077a48a273f2732567d92c02e9c6bd
-
SHA512
92fe2d2e1e997bf2593900f36939e590db6d199eed7fe5202cc1f5bdd8af337fed692df9a56281b39f75a62e085c707db14a70b3df5464f44b35e185df5aa279
-
SSDEEP
3072:QGTfd3HH9hJRNmlolFeMsjRxY7g+is+0:hlnMsuFxY7g++0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2fc27d586ba99e69ad0ab0c1b3cb4482_JaffaCakes118
Files
-
2fc27d586ba99e69ad0ab0c1b3cb4482_JaffaCakes118.exe windows:4 windows x86 arch:x86
0b11e535eb37350748ea9af4b9c5d304
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetExitCodeProcess
Sleep
TerminateProcess
FindClose
FindFirstFileA
GetCurrentDirectoryA
GetModuleFileNameA
SetEndOfFile
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetStdHandle
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
VirtualAlloc
SetFilePointer
WriteFile
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetFileType
GetStdHandle
OpenMutexA
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
LocalFree
GlobalAlloc
GlobalLock
GlobalUnlock
CreateEventA
WaitForSingleObject
WaitForMultipleObjectsEx
CreateThread
GetCurrentThread
SetEnvironmentVariableA
MulDiv
LocalAlloc
ReadFile
GetFileSize
CreateFileA
ResetEvent
GetCurrentProcess
DuplicateHandle
GetLastError
OutputDebugStringA
CreateProcessA
ResumeThread
WriteProcessMemory
OpenProcess
FreeEnvironmentStringsW
FreeEnvironmentStringsA
CloseHandle
UnhandledExceptionFilter
HeapSize
HeapReAlloc
CreateMutexA
SetHandleCount
FormatMessageA
ReadProcessMemory
SetCurrentDirectoryA
DeleteFileA
SetFileAttributesA
FindNextFileA
MoveFileA
RemoveDirectoryA
GetProcAddress
FreeLibrary
LoadLibraryA
ExitProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
HeapFree
HeapAlloc
user32
SendMessageTimeoutA
EnumWindows
EnumThreadWindows
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
UpdateWindow
PeekMessageA
TranslateMessage
DispatchMessageA
BeginPaint
EndPaint
DefWindowProcA
GetWindowDC
GetClientRect
SetWindowTextA
GetWindowRect
PostMessageA
IsWindowVisible
ShowWindow
SetForegroundWindow
BringWindowToTop
AdjustWindowRectEx
IsIconic
SystemParametersInfoA
MoveWindow
MessageBoxA
GetTabbedTextExtentA
GetDC
GetDesktopWindow
ReleaseDC
wsprintfA
GetForegroundWindow
GetWindowThreadProcessId
gdi32
GetMapMode
SetMapMode
GetDeviceCaps
DPtoLP
BitBlt
CreateCompatibleDC
DeleteDC
CreateSolidBrush
CreatePen
Rectangle
SetBkMode
LPtoDP
SetTextColor
TextOutA
CreateFontA
SelectObject
DeleteObject
CreateDIBSection
advapi32
CryptAcquireContextA
CryptCreateHash
CryptReleaseContext
CryptHashData
CryptDestroyHash
CryptImportKey
CryptVerifySignatureA
CryptDestroyKey
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
ole32
CreateStreamOnHGlobal
oleaut32
OleLoadPicture
winmm
timeGetTime
imagehlp
UnMapAndLoad
MapAndLoad
comctl32
_TrackMouseEvent
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.FFF Size: 256B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE