Static task
static1
Behavioral task
behavioral1
Sample
740c47c663f5205365ae9fb08adfb127_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
740c47c663f5205365ae9fb08adfb127_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
740c47c663f5205365ae9fb08adfb127_JaffaCakes118
-
Size
120KB
-
MD5
740c47c663f5205365ae9fb08adfb127
-
SHA1
db1c802c9a4259e20d3395daaf07dfaa2a76f502
-
SHA256
bed0bec3d123e7611dc3d722813eeb197a2b8048396cef4414f29f24af3a29c4
-
SHA512
f6074e9442bae5e53d312cfd84f37688c91102c947e9be2b894e7378c37f18b2f621020c930f77dc800779cbdcedd4d259bb9f69de5d4b000ebc170de650ffa0
-
SSDEEP
1536:bwCXu7rD0WH1/pkZ0pZVXs0OCCO6/JHdMsIEfRa2dUnwn6fRzUL9dHS8jVkVWl/A:bwPV/6ZEnXs0+SjFJG88jVsWl/Zm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 740c47c663f5205365ae9fb08adfb127_JaffaCakes118
Files
-
740c47c663f5205365ae9fb08adfb127_JaffaCakes118.exe windows:4 windows x86 arch:x86
16c44ed3bcce5282b92d7acd0d0c2536
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetProcessMemoryInfo
wininet
HttpOpenRequestA
InternetCloseHandle
HttpSendRequestA
HttpAddRequestHeadersA
InternetOpenA
InternetConnectA
DeleteUrlCacheEntry
wnhelp
Fdown
InetReadF
_registerapp@8
Fdown2
_PathProcess@4
kernel32
GetTimeZoneInformation
GetLocaleInfoW
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetStdHandle
GetOEMCP
CloseHandle
OpenProcess
SetFileAttributesA
Sleep
GetCurrentProcessId
GetModuleFileNameA
GetModuleHandleA
ReadFile
GetFileSize
CreateFileA
DeleteFileA
SetLastError
SetEndOfFile
GetLastError
FindNextFileA
FindFirstFileA
CreateThread
ExpandEnvironmentStringsA
GetComputerNameA
GetACP
LoadLibraryA
IsBadCodePtr
IsBadReadPtr
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
CreateDirectoryA
RemoveDirectoryA
GetFullPathNameA
GetCurrentDirectoryA
FindClose
RtlUnwind
VirtualQuery
GetSystemInfo
VirtualProtect
GetLocaleInfoA
InterlockedDecrement
InterlockedIncrement
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetProcAddress
TerminateProcess
GetCurrentProcess
HeapFree
RaiseException
GetSystemTimeAsFileTime
ExitThread
ResumeThread
GetStartupInfoA
GetCommandLineA
GetVersionExA
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapAlloc
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
SetUnhandledExceptionFilter
WriteFile
FlushFileBuffers
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
UnhandledExceptionFilter
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
user32
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
RegisterClassExA
DefWindowProcA
advapi32
OpenServiceA
StartServiceA
RegisterServiceCtrlHandlerA
OpenSCManagerA
CreateServiceA
CloseServiceHandle
SetServiceStatus
StartServiceCtrlDispatcherA
shell32
ShellExecuteA
rpcrt4
UuidCreateSequential
Sections
.text Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ