Static task
static1
Behavioral task
behavioral1
Sample
f2b29fdaf874b7aa009636bc563e3b2a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f2b29fdaf874b7aa009636bc563e3b2a_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
f2b29fdaf874b7aa009636bc563e3b2a_JaffaCakes118
-
Size
32KB
-
MD5
f2b29fdaf874b7aa009636bc563e3b2a
-
SHA1
a58f8ac4c562581e16b500cd1d6bb1c80536c1e8
-
SHA256
fc8aecb21a494febac361772322c938ff00e4a4b94ef691496b9a31af3f8e3ab
-
SHA512
1706d736b7ff561ab1d513ebbb7f810c85640d36c76a1903811b165afe4e0c59479290daa647b7a73dae4433108bf31c4b99c55e9c64bd34485f6bcac5f504b2
-
SSDEEP
768:pP98TBAE0nL+FOO5kbxfu3WcHX5MLonsQglbo:M0naFVUNuLHX5yug
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f2b29fdaf874b7aa009636bc563e3b2a_JaffaCakes118
Files
-
f2b29fdaf874b7aa009636bc563e3b2a_JaffaCakes118.exe windows:4 windows x86 arch:x86
a99e55b6960d44bf1b306592413304ea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyExA
CloseServiceHandle
ControlService
StartServiceA
OpenServiceA
OpenSCManagerA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
user32
GetWindowThreadProcessId
SendMessageA
FindWindowExA
KillTimer
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
SetTimer
FindWindowA
msvcp60
??0Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
gdi32
GetStockObject
ws2_32
connect
ioctlsocket
socket
closesocket
msvcrt
srand
strncmp
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
atoi
_except_handler3
_controlfp
strstr
strcmp
??2@YAPAXI@Z
strcpy
_snprintf
strlen
strncpy
malloc
memset
memcpy
free
sprintf
strcat
strtok
rand
__set_app_type
strchr
_vsnprintf
kernel32
OpenProcess
VirtualAllocEx
GetStartupInfoA
ReadProcessMemory
VirtualFreeEx
GetLogicalDriveStringsA
GetDriveTypeA
lstrcatA
CreateDirectoryA
CreateMutexA
ReleaseMutex
GetTempPathA
GetLocaleInfoA
GetVersionExA
GetModuleFileNameA
ExpandEnvironmentStringsA
lstrlenA
WriteProcessMemory
SetFileAttributesA
CopyFileA
GetFileAttributesA
TerminateThread
lstrcmpiA
GetModuleHandleA
GetProcAddress
LoadLibraryA
CreateFileA
ExitThread
GetTickCount
WriteFile
CloseHandle
GetLastError
CreateThread
CreateProcessA
WaitForSingleObject
Sleep
ExitProcess
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 275KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE