Static task
static1
Behavioral task
behavioral1
Sample
f8fb6502c44f3e957c267f28ed6ab906_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f8fb6502c44f3e957c267f28ed6ab906_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f8fb6502c44f3e957c267f28ed6ab906_JaffaCakes118
-
Size
75KB
-
MD5
f8fb6502c44f3e957c267f28ed6ab906
-
SHA1
c0bb3c8f5d0d38d0cbbb38b5f7e2d6e86e1e356a
-
SHA256
75fbf35b8ed9ea115a92e8764c69c7ad43680a4597ce9a497e1c9d5fa42619fc
-
SHA512
7fc63d61a2c03449343ecc69eab06e778ea43c3d0bd7ce2aceab366cd0c4847a4970ec790fe0eb67974f2d5ac793e80f44bc28d09bb885a02968e7769ef5947a
-
SSDEEP
1536:vHhJ+uANHaGzfuEV4YncGw1lBj+OcAMduKMgG7K+TA6l8RyoYaYFfP8csr:vBl2fuEV4YcGwjBj+5AOG7K6WRjYd8cY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f8fb6502c44f3e957c267f28ed6ab906_JaffaCakes118
Files
-
f8fb6502c44f3e957c267f28ed6ab906_JaffaCakes118.exe windows:5 windows x86 arch:x86
0423061af0ac3ffcca9e052a6fcb183d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
??1type_info@@UAE@XZ
_controlfp
_except_handler3
?terminate@@YAXXZ
__CxxFrameHandler
_iob
??2@YAPAXI@Z
_ui64tow
_wtoi64
_ftol
_wcsicmp
_initterm
__wgetmainargs
__winitenv
calloc
free
wcstod
wcstol
wcsstr
wcsncmp
_wcsnicmp
realloc
fflush
fprintf
wcschr
strtok
exit
_cexit
_XcptFilter
_exit
_c_exit
_CxxThrowException
wcstok
wcslen
wcscpy
??3@YAXPAX@Z
advapi32
RegQueryValueExW
RegConnectRegistryW
RegOpenKeyExW
RegCloseKey
kernel32
GetConsoleMode
SetConsoleMode
ReadFile
ReadConsoleW
MultiByteToWideChar
LoadLibraryW
GetProcAddress
FreeLibrary
lstrcpynW
WideCharToMultiByte
VerSetConditionMask
VerifyVersionInfoW
lstrcmpW
LocalFree
lstrcatW
FormatMessageW
LocalAlloc
InterlockedIncrement
GetStdHandle
lstrcpyW
GetDateFormatW
GetTimeFormatW
InterlockedDecrement
GetLastError
GetConsoleScreenBufferInfo
GetUserDefaultLCID
lstrcmpiW
GetComputerNameExW
FileTimeToSystemTime
GetModuleHandleA
lstrlenW
WriteConsoleW
SetConsoleCursorPosition
SetLastError
GetNumberFormatW
GetLocaleInfoW
user32
LoadStringW
CharUpperW
wsprintfW
mpr
WNetGetLastErrorW
WNetCancelConnection2W
ole32
CoTaskMemAlloc
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
CoTaskMemFree
CoUninitialize
oleaut32
SafeArrayGetUBound
VariantChangeType
SysAllocStringByteLen
SafeArrayGetElement
SafeArrayGetLBound
SysStringLen
SysFreeString
SysAllocString
VariantClear
VariantCopy
VariantInit
framedyn
?Empty@CHString@@QAEXXZ
?Compare@CHString@@QBEHPBG@Z
??YCHString@@QAEABV0@PBG@Z
?Left@CHString@@QBE?AV1@H@Z
?FindOneOf@CHString@@QBEHPBG@Z
?Find@CHString@@QBEHG@Z
?Mid@CHString@@QBE?AV1@H@Z
??0CHString@@QAE@PBG@Z
?GetData@CHString@@IBEPAUCHStringData@@XZ
??4CHString@@QAEABV0@PBG@Z
??1CHString@@QAE@XZ
??4CHString@@QAEABV0@ABV0@@Z
?Right@CHString@@QBE?AV1@H@Z
??0CHString@@QAE@XZ
?ReleaseBuffer@CHString@@QAEXH@Z
?GetBufferSetLength@CHString@@QAEPAGH@Z
?GetBuffer@CHString@@QAEPAGH@Z
?Mid@CHString@@QBE?AV1@HH@Z
?Format@CHString@@QAAXPBGZZ
??YCHString@@QAEABV0@ABV0@@Z
??H@YG?AVCHString@@PBGABV0@@Z
secur32
GetUserNameExW
ws2_32
inet_addr
WSAGetLastError
WSAStartup
WSACleanup
gethostbyaddr
Sections
.text Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 108B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 21B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.TOT Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE