Static task
static1
Behavioral task
behavioral1
Sample
0439af13643e415af859850c152d71d3_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0439af13643e415af859850c152d71d3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0439af13643e415af859850c152d71d3_JaffaCakes118
-
Size
1.1MB
-
MD5
0439af13643e415af859850c152d71d3
-
SHA1
4dae0fca60df3747dae3de895ade080fca307665
-
SHA256
2027f972423c9596b6489ee0a1c4dabf8897fb6d470ad56db8a0a8f6c6fdf0a8
-
SHA512
97f349ca63f9d0b25bff2440318ceeef5813a3dc8635cc83e6fb7eb8677bdf75d68dd509a0fe5f05acc05d138b7767c8e2dbb4b64ebae5dbdb53f0612d43c79c
-
SSDEEP
1536:wgMjmRYpW0JICSc9lpUelvS/uAHA5DbU9+:lMjMYnJIlc9luaaNg5DIk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0439af13643e415af859850c152d71d3_JaffaCakes118
Files
-
0439af13643e415af859850c152d71d3_JaffaCakes118.exe windows:4 windows x86 arch:x86
93fa19d6b9300976f08a43a3c6977e4a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
urlmon
URLDownloadToFileA
kernel32
WaitForSingleObject
CreateProcessA
ExpandEnvironmentStringsA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LoadLibraryA
CloseHandle
GetCurrentProcess
ExitThread
ReleaseMutex
GetTickCount
CreateMutexA
GetLocaleInfoA
GetVersionExA
GetFileAttributesA
CopyFileA
SetFileAttributesA
GetWindowsDirectoryA
WriteFile
CreateFileA
lstrlenA
CreateDirectoryA
lstrcatA
GetDriveTypeA
lstrcmpiA
GlobalFree
GlobalAlloc
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SetFilePointer
GetFileSize
FindClose
FindNextFileA
GetFullPathNameA
SetCurrentDirectoryA
FindFirstFileA
GlobalUnlock
GlobalLock
InterlockedDecrement
ReadFile
GetSystemTime
TerminateThread
ExitProcess
CreateThread
LocalFree
WideCharToMultiByte
GetStartupInfoA
GetLastError
GetTempPathA
Sleep
GetLogicalDriveStringsA
user32
BringWindowToTop
EnumWindows
keybd_event
ShowWindow
IsWindow
SetFocus
SetForegroundWindow
FindWindowA
GetWindowTextA
CharLowerA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
BlockInput
VkKeyScanA
msvcrt
wcslen
_CxxThrowException
strcpy
_controlfp
strstr
strlen
??1type_info@@UAE@XZ
strchr
sprintf
rand
memset
_snprintf
memcmp
strncpy
srand
strtok
strcmp
_vsnprintf
??2@YAPAXI@Z
memcpy
strcat
free
malloc
_except_handler3
__CxxFrameHandler
atoi
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
advapi32
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyExA
GetUserNameA
ws2_32
closesocket
connect
ioctlsocket
socket
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
VariantClear
SysFreeString
SysAllocString
VariantInit
Sections
.text Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 277KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE