Static task
static1
Behavioral task
behavioral1
Sample
705c585d669f8a75bbbb12dec4a751bd_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
705c585d669f8a75bbbb12dec4a751bd_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
705c585d669f8a75bbbb12dec4a751bd_JaffaCakes118
-
Size
160KB
-
MD5
705c585d669f8a75bbbb12dec4a751bd
-
SHA1
f20441e4618aa908edf43730ab47d6d15fed192e
-
SHA256
5762bd50eaa204b43cd2b5e87adf087613605f0af8511cf5206e65cf486e814d
-
SHA512
854f38069c0e02a4f0a833e9f61705df27e5f6c81524266264944bb7453791789085ecd728873a680fa7a3b1e7639a8860abef7239d65904b13250d7fc34bdf6
-
SSDEEP
1536:+6/aiYDldnRggp9xlTGwuhpNcZVVfCfuCb+5CvjoQmz3ySV:+6/ypp9HTGw2NOVNCfuCK5CchySV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 705c585d669f8a75bbbb12dec4a751bd_JaffaCakes118
Files
-
705c585d669f8a75bbbb12dec4a751bd_JaffaCakes118.exe windows:4 windows x86 arch:x86
32ff05142418035cf945838cb9664680
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord823
ord825
msvcrt
_onexit
__dllonexit
_controlfp
__set_app_type
__CxxFrameHandler
__p__fmode
_CxxThrowException
wcslen
memmove
_ftol
malloc
_except_handler3
realloc
free
strstr
strncpy
exit
atoi
rand
sprintf
strncmp
_beginthreadex
calloc
??1type_info@@UAE@XZ
_exit
_XcptFilter
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
kernel32
lstrlenW
GetCurrentThreadId
CopyFileA
LocalFree
WideCharToMultiByte
MoveFileA
GetStartupInfoA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetProcAddress
LoadLibraryA
CreateEventA
WaitForSingleObject
ResetEvent
SetEvent
InterlockedExchange
CancelIo
Sleep
CloseHandle
WriteFile
SetFilePointer
CreateFileA
GetFileSize
ReadFile
GetWindowsDirectoryA
VirtualAlloc
GetFileAttributesA
CreateProcessA
lstrlenA
lstrcpyA
TerminateThread
lstrcatA
GetTickCount
DeleteFileA
GetLastError
GetCurrentProcess
HeapAlloc
GetProcessHeap
GetModuleHandleA
GetDiskFreeSpaceExA
GetDriveTypeA
GlobalMemoryStatusEx
GetSystemInfo
GetVersionExA
InterlockedDecrement
MultiByteToWideChar
OpenEventA
CreateMutexA
ExitProcess
GetModuleFileNameA
CreateThread
MoveFileExA
lstrcmpiA
user32
ShowWindow
GetInputState
FindWindowA
LoadCursorA
SendMessageA
PostThreadMessageA
GetWindow
GetMessageA
RegisterClassA
wsprintfA
PostMessageA
GetDlgCtrlID
LoadIconA
CloseDesktop
SetThreadDesktop
GetUserObjectInformationA
GetThreadDesktop
OpenInputDesktop
SendInput
OpenDesktopA
FindWindowExA
gdi32
GetStockObject
advapi32
RegOpenKeyExA
LookupPrivilegeValueA
CloseEventLog
ClearEventLogA
OpenEventLogA
OpenSCManagerA
CreateServiceA
LockServiceDatabase
ChangeServiceConfig2A
UnlockServiceDatabase
OpenServiceA
StartServiceA
CloseServiceHandle
OpenProcessToken
StartServiceCtrlDispatcherA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
AdjustTokenPrivileges
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ws2_32
select
recv
WSAStartup
setsockopt
connect
getsockname
gethostname
WSACleanup
closesocket
socket
gethostbyname
htons
send
iphlpapi
GetIfTable
ole32
CLSIDFromProgID
CoCreateInstance
CoUninitialize
CLSIDFromString
CoInitialize
OleRun
oleaut32
SysFreeString
SysAllocString
GetErrorInfo
SetErrorInfo
VariantChangeType
CreateErrorInfo
VariantInit
VariantClear
wininet
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ