Static task
static1
Behavioral task
behavioral1
Sample
07803f4cacdeab8358c1fb09e6f6bece_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
07803f4cacdeab8358c1fb09e6f6bece_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
07803f4cacdeab8358c1fb09e6f6bece_JaffaCakes118
-
Size
107KB
-
MD5
07803f4cacdeab8358c1fb09e6f6bece
-
SHA1
8b55dc6c232b7ee1496459967b2e4e93decfe0d6
-
SHA256
186650b00e95c12042256c90f749cb203f9ee9a7ed56932875d5835b577e384c
-
SHA512
9271d7bf2a51191efce652a5e867ae7b63783245af67c2241f3a7d06c501ff34ec7d1f8dce9a6f4e518df79287ddc273f6d1127aeb0707af1a47e6957b497b34
-
SSDEEP
1536:R+I70fLLCol0+xUAh0zhvgLqYjJUSfx48juHn/a82LANW:EI7giCJxfKhvgLqYjSkxN0/aBYW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07803f4cacdeab8358c1fb09e6f6bece_JaffaCakes118
Files
-
07803f4cacdeab8358c1fb09e6f6bece_JaffaCakes118.exe windows:4 windows x86 arch:x86
4300186ce4f653e6f737e59aa336f6a6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord5572
ord2915
ord941
ord5710
ord536
ord6334
ord4160
ord6453
ord6215
ord2642
ord6199
ord3092
ord6734
ord6143
ord922
ord926
ord2818
ord939
ord5861
ord934
ord5216
ord665
ord603
ord6883
ord1979
ord1969
ord5829
ord273
ord5186
ord354
ord4278
ord2652
ord1669
ord4224
ord1200
ord693
ord539
ord2582
ord4402
ord3370
ord3640
ord6888
ord6907
ord5683
ord3996
ord6675
ord2614
ord4277
ord6282
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord815
ord561
ord2725
ord654
ord341
ord6283
ord5858
ord6662
ord940
ord6877
ord6140
ord3663
ord5440
ord6383
ord5450
ord6394
ord4129
ord858
ord924
ord3811
ord2820
ord296
ord1168
ord1576
ord5214
ord617
ord1105
ord356
ord2770
ord668
ord2370
ord860
ord765
ord3698
ord801
ord541
ord535
ord537
ord3803
ord4202
ord2764
ord2302
ord692
ord540
ord567
ord800
ord3639
ord4424
ord3402
ord5290
ord4401
ord1776
ord6055
ord2581
ord4219
ord2024
ord2413
ord6366
ord1771
ord2645
ord4234
ord641
ord324
ord3597
ord4425
ord4627
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord2514
ord4710
ord4998
ord4853
ord4376
ord5265
ord823
ord3998
ord825
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
calloc
ftell
fopen
fclose
fseek
fread
_setmbcp
__CxxFrameHandler
_except_handler3
malloc
free
_vsnprintf
sprintf
_mbsrchr
_mbsicmp
fwrite
atol
_ismbcdigit
_mbschr
_mbsnbcpy
memmove
strrchr
strncpy
strchr
_mbscmp
kernel32
GetLongPathNameA
Module32Next
Process32Next
OpenProcess
TerminateProcess
SetFileAttributesA
RemoveDirectoryA
CopyFileA
MoveFileExA
GetShortPathNameA
WritePrivateProfileStringA
CreateMutexA
GetLastError
LoadLibraryA
FindFirstFileA
DeleteFileA
CreateDirectoryA
FindClose
FreeLibrary
GetModuleFileNameA
CreateFileA
SetFilePointer
GetCurrentProcessId
GetLocalTime
WriteFile
FlushFileBuffers
CloseHandle
Module32First
GetModuleHandleA
GetProcAddress
GetVersionExA
MoveFileA
SetFileTime
SystemTimeToFileTime
SetEndOfFile
FileTimeToSystemTime
lstrcpynA
ReleaseMutex
CreateEventA
SetEvent
GetTempPathA
GetFileSize
GetStartupInfoA
Process32First
CreateToolhelp32Snapshot
FindNextFileA
Sleep
GetSystemDirectoryA
TerminateThread
WaitForSingleObject
GetFileAttributesA
GetPrivateProfileStringA
GetPrivateProfileIntA
SetLastError
lstrlenA
lstrcatA
lstrcpyA
CreateProcessA
GetCurrentProcess
ResumeThread
SuspendThread
OutputDebugStringA
lstrcmpiA
MultiByteToWideChar
user32
IsWindow
EnableWindow
wsprintfA
GetWindowRect
SendMessageA
PostMessageA
GetWindowThreadProcessId
GetClassNameA
EnumWindows
advapi32
DeleteService
OpenServiceA
CloseServiceHandle
OpenSCManagerA
RegOpenKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
SysFreeString
VariantClear
wininet
InternetReadFile
InternetCloseHandle
HttpQueryInfoA
InternetSetOptionA
HttpOpenRequestA
InternetCrackUrlA
InternetOpenA
InternetConnectA
InternetAttemptConnect
HttpSendRequestA
netapi32
Netbios
iphlpapi
GetAdaptersInfo
shlwapi
PathSkipRootA
PathFileExistsA
PathRemoveFileSpecA
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.WYCao Size: 7KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ