Static task
static1
Behavioral task
behavioral1
Sample
10de4d42879e75537b2a054096727bbe_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
10de4d42879e75537b2a054096727bbe_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
10de4d42879e75537b2a054096727bbe_JaffaCakes118
-
Size
674KB
-
MD5
10de4d42879e75537b2a054096727bbe
-
SHA1
db5e0b8304e6b777ff33d20e2a6254b6382471d6
-
SHA256
0255cd2cf4f9600aa284e4fffc627641429d2d38e5fa1ac5b1a34dbc099ad2cc
-
SHA512
8ffedecfb5aa2d3f0b011a7b4cbb8a7860605c385d14dd54361cada1013fe4ef2164fdecd5fb1e43c0376699176b73c835980bb932880d548a4c892990e86f33
-
SSDEEP
12288:S9nSu0bWcdEs9nSu0bWcdEe9nSu0bWcdEs9nSu0bWcdE:GnSBEonSBEKnSBEonSBE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10de4d42879e75537b2a054096727bbe_JaffaCakes118
Files
-
10de4d42879e75537b2a054096727bbe_JaffaCakes118.exe windows:4 windows x86 arch:x86
80b4634510462cc0c5f3c99e50862271
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
GetPixel
SelectObject
kernel32
AddAtomA
CloseHandle
CreateFileA
CreateMailslotA
CreateProcessA
CreateSemaphoreA
CreateThread
CreateToolhelp32Snapshot
ExitProcess
FindAtomA
GetAtomNameA
GetCommandLineA
GetComputerNameA
GetDriveTypeA
GetFileTime
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetStartupInfoA
GetSystemTime
GetVersionExA
GlobalLock
GlobalMemoryStatus
GlobalUnlock
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
OpenFile
OpenProcess
Process32First
Process32Next
ReadFile
ReleaseSemaphore
SetCurrentDirectoryA
SetFileAttributesA
SetFileTime
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WriteFile
msvcrt
_mkdir
__getmainargs
__p___argc
__p___argv
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_findclose
_findfirst
_findnext
_iob
_onexit
_setmode
_splitpath
abort
atexit
atof
atoi
exit
fclose
fflush
fgetc
fopen
fprintf
fputc
fread
free
fscanf
fseek
ftell
fwrite
getenv
malloc
memmove
memset
rand
realloc
remove
signal
sprintf
srand
sscanf
strcat
strcmp
strcpy
strlen
strstr
time
shell32
ShellExecuteA
shlwapi
PathFileExistsA
user32
CallNextHookEx
CloseClipboard
DispatchMessageA
GetClipboardData
GetDC
GetDesktopWindow
GetKeyState
GetMessageA
GetWindowRect
MessageBoxA
OpenClipboard
ReleaseDC
SetWindowsHookExA
TranslateMessage
UnhookWindowsHookEx
wininet
HttpOpenRequestA
HttpSendRequestA
InternetCloseHandle
InternetConnectA
InternetGetConnectedState
InternetOpenA
InternetReadFile
winmm
mciSendCommandA
mciSendStringA
wsock32
WSACleanup
WSAStartup
accept
bind
closesocket
connect
gethostbyaddr
gethostbyname
htons
listen
recv
send
socket
Sections
.text Size: 138KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE