Static task
static1
Behavioral task
behavioral1
Sample
ea1824acae4c739b3e3a358bde7317b0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ea1824acae4c739b3e3a358bde7317b0_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
ea1824acae4c739b3e3a358bde7317b0_JaffaCakes118
-
Size
475KB
-
MD5
ea1824acae4c739b3e3a358bde7317b0
-
SHA1
64ac33832da46199a435e5cbbe8e08f94138a64b
-
SHA256
077db95a9b9bdda48bd461b533ea45eaf621dbb67e2907d8a9db936d6330f9fe
-
SHA512
d77b1e83640ebc6fa9e3860b4e95eaab00f92feaf7254d6e1c4390f7e47a3d40753ea48388f2fec3f65c0a0563bec72b4326173360f7f08c123651aa3fb7bfb3
-
SSDEEP
12288:42VUACHaEu/9FyR8LzrO2Zqr6WPDO9cfOcP:42VUApEuCR8rpqr6WPD5fOcP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea1824acae4c739b3e3a358bde7317b0_JaffaCakes118
Files
-
ea1824acae4c739b3e3a358bde7317b0_JaffaCakes118.exe windows:6 windows x86 arch:x86
26ac95fc7a73f686d9413c79942cad0f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetSetStatusCallback
InternetSetDialState
ws2_32
closesocket
gethostbyname
select
WSASocketW
WSAStartup
inet_addr
send
socket
connect
WSAEnumProtocolsW
recv
htons
__WSAFDIsSet
WSACleanup
kernel32
CreateFileW
lstrcmpA
DeactivateActCtx
UnmapViewOfFile
SetCurrentDirectoryA
CreateToolhelp32Snapshot
MultiByteToWideChar
Sleep
CompareStringA
GetLastError
ZombifyActCtx
SetEvent
LoadLibraryA
Process32Next
CloseHandle
CreateThread
HeapAlloc
GetProcAddress
CreateFileMappingA
LocalFree
lstrcpynA
GetCurrentProcessId
GetProcessHeap
GetModuleHandleW
LocalAlloc
ReleaseActCtx
CreateEventA
BackupSeek
GetTickCount
LocalUnlock
MapViewOfFileEx
LoadLibraryExW
FindNextFileA
FindFirstFileExA
FindClose
HeapReAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileType
GetACP
GetCommandLineW
GetCommandLineA
WaitForSingleObject
GetThreadLocale
VirtualAlloc
WriteFile
GetCurrentProcess
VirtualFree
HeapFree
Process32First
ActivateActCtx
GetLogicalDrives
CreateActCtxW
GetModuleFileNameA
WriteConsoleW
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
HeapSize
GetConsoleCP
GetConsoleMode
SetFilePointerEx
FlushFileBuffers
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
InitializeSListHead
RaiseException
RtlUnwind
FreeLibrary
ExitProcess
GetModuleHandleExW
GetStdHandle
user32
CharNextA
GetFocus
GetDC
CloseWindowStation
GetClipboardOwner
CreatePopupMenu
DialogBoxParamA
WindowFromPoint
ChangeClipboardChain
GetUserObjectSecurity
DestroyMenu
SetFocus
TrackPopupMenuEx
OpenWindowStationW
ReleaseDC
gdi32
AbortDoc
CreateBrushIndirect
EqualRgn
CreateRectRgn
TextOutA
ChoosePixelFormat
GetGlyphIndicesW
EnumObjects
DeleteObject
FillRgn
advapi32
RegEnumValueA
RegCreateKeyA
RegDisablePredefinedCacheEx
GetSecurityDescriptorDacl
ControlTraceA
RegCloseKey
GetAclInformation
StopTraceA
RegQueryValueExA
StartTraceA
RegCreateKeyExA
GetSecurityDescriptorControl
GetNamedSecurityInfoA
FileEncryptionStatusA
RegSetValueExA
OpenProcessToken
QueryTraceA
IsTokenUntrusted
RegDeleteValueA
Sections
.text Size: 352KB - Virtual size: 351KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ