Static task
static1
Behavioral task
behavioral1
Sample
e853bfa0afbebbf36ea68019b5725665_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e853bfa0afbebbf36ea68019b5725665_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e853bfa0afbebbf36ea68019b5725665_JaffaCakes118
-
Size
140KB
-
MD5
e853bfa0afbebbf36ea68019b5725665
-
SHA1
b032e4317f75e2d986a7c258536e9f42dde7476f
-
SHA256
977c3dc18d06b2d39ad27e4941692ee847447ddf000943b802ba448438b3e5f3
-
SHA512
16e0ea1ecc7998958c9f62085e3fcd9197ce00b6cf20112f53e211c98d1d49d115f8fa7aba2988cdea2d983a21faf6834c9e28f9a825768dfa74708f023ada94
-
SSDEEP
3072:Yomcpp646jvCztYstRrD/g85uV+wVVxoFitN72Gx:Yomcfq9st/5uV+wlMhw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e853bfa0afbebbf36ea68019b5725665_JaffaCakes118
Files
-
e853bfa0afbebbf36ea68019b5725665_JaffaCakes118.exe windows:4 windows x86 arch:x86
0c2997195b5fbfb59c190572de5cbec0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSACleanup
WSAStartup
WSAAsyncGetHostByName
WSAIsBlocking
WSACancelBlockingCall
connect
getsockname
recv
send
ntohs
WSAAsyncSelect
WSAGetLastError
WSASetLastError
select
closesocket
recvfrom
sendto
socket
getservbyname
setsockopt
bind
htons
htonl
ntohl
gethostname
gethostbyname
inet_addr
ioctlsocket
comctl32
InitCommonControlsEx
kernel32
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LoadLibraryA
RtlUnwind
InitializeCriticalSection
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
SetHandleCount
HeapSize
GetCurrentThreadId
lstrcatA
lstrcpynA
lstrlenA
CloseHandle
GetFileSize
CreateFileA
GetLastError
lstrcmpA
lstrcpyA
Sleep
GetCurrentDirectoryA
SetEnvironmentVariableA
LocalFree
FormatMessageA
GlobalUnlock
GlobalLock
GlobalAlloc
GetTickCount
GetPrivateProfileStringA
WritePrivateProfileStringA
GetSystemTime
SetFilePointer
GetLocalTime
WriteFile
SetLastError
lstrcmpiA
ReadFile
WaitForSingleObject
SetThreadPriority
ReleaseSemaphore
SetEvent
CreateSemaphoreA
CreateEventA
TerminateThread
DeleteFileA
GetFileAttributesA
CreateProcessA
CompareStringA
FindClose
FindNextFileA
GetDateFormatA
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
SetProcessWorkingSetSize
GetCurrentProcess
GetEnvironmentVariableA
GetModuleFileNameA
ReleaseMutex
CreateMutexA
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
GetFullPathNameA
InterlockedDecrement
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
ExitProcess
GetModuleHandleA
GetProcAddress
VirtualAlloc
VirtualFree
HeapCreate
GetEnvironmentStringsW
HeapDestroy
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetTimeZoneInformation
WideCharToMultiByte
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
GetProcessHeap
GetVersionExA
GetCommandLineA
HeapFree
GetDriveTypeA
CreateThread
ResumeThread
ExitThread
HeapAlloc
HeapReAlloc
GetSystemTimeAsFileTime
CompareStringW
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
SetCurrentDirectoryA
WriteConsoleW
user32
RegisterClassA
GetClassInfoA
FindWindowA
UnregisterClassA
CreateWindowExA
LoadIconA
SetClassLongA
GetSystemMenu
AppendMenuA
CheckMenuItem
GetSystemMetrics
DialogBoxParamA
GetTopWindow
GetClientRect
MapDialogRect
InvalidateRect
DestroyIcon
MoveWindow
SetForegroundWindow
GetWindow
WinHelpA
CreateDialogParamA
GetDC
ReleaseDC
EnableWindow
SendDlgItemMessageA
EndDialog
DestroyWindow
LoadMenuA
GetCursorPos
GetSubMenu
TrackPopupMenu
DestroyMenu
MessageBeep
GetWindowTextA
SetWindowTextA
GetDialogBaseUnits
SetWindowLongA
GetFocus
ShowWindow
CallWindowProcA
EmptyClipboard
SetClipboardData
CloseClipboard
wvsprintfA
GetWindowLongA
SetWindowsHookExA
MessageBoxA
UnhookWindowsHookEx
IsWindowVisible
GetWindowRect
SystemParametersInfoA
SetWindowPos
DefWindowProcA
KillTimer
SetTimer
GetDlgItem
SendMessageA
SetDlgItemTextA
SetDlgItemInt
GetParent
GetDlgItemInt
PostMessageA
GetDlgItemTextA
wsprintfA
OpenClipboard
gdi32
LPtoDP
GetTextExtentPoint32A
advapi32
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegDeleteKeyA
RegCreateKeyExA
shell32
DragAcceptFiles
DragQueryFileA
DragFinish
SHBrowseForFolderA
SHGetPathFromIDListA
Shell_NotifyIconA
Sections
.text Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ