Static task
static1
Behavioral task
behavioral1
Sample
fe8a05946d384f65ccbe35cedf09ffe0_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fe8a05946d384f65ccbe35cedf09ffe0_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fe8a05946d384f65ccbe35cedf09ffe0_JaffaCakes118
-
Size
97KB
-
MD5
fe8a05946d384f65ccbe35cedf09ffe0
-
SHA1
fecebe6db8fbb1e8c891f1dbf23ea8ac1dcbbfa8
-
SHA256
110939b84fe48bc4e9f25acf03cb6f601fd695d2cce850ff429031a742627116
-
SHA512
4aa45f41ee88a59d42059f198c1d28944baf594685626b744b0abe4111edad16cfda182f228b0bc5179d65bd0835eceef91f7baa826c446e7d1b1eba57ba2bfa
-
SSDEEP
3072:9vpqmnlqs1Ow9HgLsfxYYvw5hwsyRxQs6:9xFXb9HxmBhVyRxZ6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fe8a05946d384f65ccbe35cedf09ffe0_JaffaCakes118
Files
-
fe8a05946d384f65ccbe35cedf09ffe0_JaffaCakes118.exe windows:4 windows x86 arch:x86
ded067fb969335c6e7d9e9dabc31848f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetQueryDataAvailable
InternetReadFile
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetCrackUrlA
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetSetOptionA
shlwapi
PathFileExistsA
PathGetDriveNumberA
snmpapi
SnmpUtilOidCpy
mfc42
ord825
ord823
msvcrt
sprintf
_except_handler3
strstr
strncat
div
wcslen
_CxxThrowException
_strlwr
_strdup
??1type_info@@UAE@XZ
memmove
strncpy
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
_onexit
__dllonexit
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__CxxFrameHandler
__setusermatherr
kernel32
WideCharToMultiByte
GetStartupInfoA
SetFilePointer
ReadFile
LocalFree
LoadLibraryA
FreeLibrary
CreateProcessA
DeviceIoControl
WriteFile
GetTickCount
GetModuleFileNameA
GetTempPathA
GetComputerNameA
GetVersion
CreateFileA
GetModuleHandleA
GetProcAddress
VirtualAlloc
VirtualFree
CloseHandle
GetVolumeInformationA
SetLastError
GetEnvironmentVariableA
GetCurrentProcess
TerminateProcess
InterlockedDecrement
lstrlenA
MultiByteToWideChar
GetLastError
user32
CharToOemA
advapi32
GetUserNameA
shell32
ShellExecuteExA
SHGetSpecialFolderPathA
ole32
OleRun
CLSIDFromString
CoUninitialize
CoInitialize
CoCreateInstance
CLSIDFromProgID
oleaut32
VariantClear
GetErrorInfo
SysAllocString
SysFreeString
msvcp60
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Xran@std@@YAXXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Xlen@std@@YAXXZ
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@DABV10@@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
Sections
.text Size: 90KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ