Static task
static1
Behavioral task
behavioral1
Sample
62d3711f50d5ae5e98daf52634ab6315_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
62d3711f50d5ae5e98daf52634ab6315_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
62d3711f50d5ae5e98daf52634ab6315_JaffaCakes118
-
Size
88KB
-
MD5
62d3711f50d5ae5e98daf52634ab6315
-
SHA1
77838c5978ce563391bf8bc3702d6835b83d4602
-
SHA256
5ac4bb38301a470e80292f98cd1783975b5721d52f14a40feb9efb4a013b8dc4
-
SHA512
5de643ae14080ac0a8175a0ee5e03a5e28fc1d022b12877d408b651bf5246ebfc5d2b1b21a1705f0024a1cbf3c0fa40358baa489640996669cc0726ac22f0283
-
SSDEEP
1536:I5J7BzBTW6vRYn7+z6udwDGuKmOasc/qdyY6O5yhC3jahEBPxGe6iz5:URBVvdTcOasACr+uBJfDz5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 62d3711f50d5ae5e98daf52634ab6315_JaffaCakes118
Files
-
62d3711f50d5ae5e98daf52634ab6315_JaffaCakes118.exe windows:5 windows x86 arch:x86
9220918625af75a9aaf115d604ba02ee
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc90
ord3244
ord4895
ord3554
ord796
ord595
ord316
ord436
ord820
ord6613
ord1108
ord1137
ord1938
ord2057
ord4993
ord2591
ord4431
ord4617
ord6584
ord2069
ord524
ord744
ord5167
ord2539
ord4502
ord310
ord4252
ord2899
ord300
ord817
ord5152
ord2905
ord6257
ord1691
ord1087
ord1252
ord1061
ord2590
ord2614
ord3506
ord4668
ord5636
ord4650
ord1496
ord6388
ord3344
ord1678
ord1809
ord1810
ord5309
ord5615
ord3213
ord305
ord1611
ord941
ord572
ord773
ord3639
ord961
ord1566
ord5793
ord6087
ord5232
ord5285
ord5162
ord4570
ord4695
ord4654
ord1617
ord5796
ord3135
ord5071
ord5664
ord2046
ord4030
ord3663
ord2618
ord2630
ord2610
ord969
ord965
ord967
ord963
ord958
ord5666
ord5668
ord6446
ord1729
ord4688
ord5139
ord3732
ord5647
ord4589
ord6780
ord5497
ord2074
ord5585
ord4644
ord1497
ord4331
ord1752
ord1755
ord6391
ord3346
ord2280
ord3987
ord374
ord4434
ord4409
ord6783
ord4159
ord6781
ord4733
ord2251
ord2206
ord6018
ord4165
ord1046
ord5533
ord6721
ord5813
ord4199
ord2087
ord3209
ord5657
ord5659
ord2447
ord4333
ord4981
ord5663
ord5646
ord6001
ord2766
ord2978
ord3107
ord4714
ord2961
ord5633
ord1728
ord1791
ord1792
ord2139
ord5608
ord1446
ord3218
ord6356
ord5389
ord3671
ord6782
ord4160
ord6784
ord3110
ord2769
ord2888
ord2759
ord4066
ord4067
ord4057
ord2886
ord4334
ord1644
ord2368
ord2375
ord2625
ord2607
ord2605
ord2623
ord2635
ord2612
ord2628
ord2633
ord6103
ord2616
ord4890
ord4667
ord3659
ord686
ord601
ord693
ord639
ord2208
ord1182
ord793
ord589
ord4029
ord2620
ord947
ord4952
ord1276
ord6335
ord800
msvcr90
_CxxThrowException
_setmbcp
_controlfp_s
_invoke_watson
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
memcpy
strcpy
clock
strlen
malloc
free
memset
__CxxFrameHandler3
kernel32
GetModuleFileNameA
GetModuleHandleA
GetVersionExA
FreeLibrary
InterlockedExchange
TerminateProcess
SetLastError
CloseHandle
Sleep
GetLastError
GetCurrentProcessId
LoadLibraryA
GetTickCount
GetProcAddress
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
GetStartupInfoA
InterlockedCompareExchange
user32
MessageBoxA
LoadIconA
GetSystemMenu
AppendMenuA
SendMessageA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
InvalidateRect
SetTimer
KillTimer
EnableWindow
advapi32
OpenProcessToken
InitializeAcl
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
GetSidSubAuthority
wsock32
inet_addr
gethostname
closesocket
socket
WSAGetLastError
setsockopt
WSAAsyncSelect
sendto
gethostbyname
ioctlsocket
recvfrom
WSAStartup
msvcp90
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??$?9DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NPBDABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@@Z
??$?8DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
Sections
.text Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ