Static task
static1
Behavioral task
behavioral1
Sample
09fa0fcc15900672be963e84104e42ee_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
09fa0fcc15900672be963e84104e42ee_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
09fa0fcc15900672be963e84104e42ee_JaffaCakes118
-
Size
3.7MB
-
MD5
09fa0fcc15900672be963e84104e42ee
-
SHA1
f543b5ee46680f842af467591fee8163f1d372ea
-
SHA256
1c619d85d7a76d71c33b7f15fb61d7aa76bcb32b0008bd69495d487c670476bb
-
SHA512
2afbf70561f70b8157a4a6c3313b821fd426f423b40f5b24d3ffc12341fd73cc609cb4ca404de42b4e7f0349a27273dfa88c8e533c5a35f5c7eec69c6f765c2b
-
SSDEEP
98304:HK4ZT71K2IxceaDa1mDaa/bQI8ms/QMtxo9rJ6Ws:HKW/sFtaDa1eaa/EI859xo9rJls
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 09fa0fcc15900672be963e84104e42ee_JaffaCakes118
Files
-
09fa0fcc15900672be963e84104e42ee_JaffaCakes118.exe windows:4 windows x86 arch:x86
bb9f9d6add305fe17bbb8b6928a1395b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSettings
DragFinish
ShellExecuteA
FindExecutableW
ole32
OleLockRunning
OleSave
ws2_32
htonl
WSAAccept
gethostname
ioctlsocket
WSAEnumNameSpaceProvidersA
inet_addr
WSAHtons
WSALookupServiceNextW
comdlg32
PageSetupDlgW
GetOpenFileNameA
advapi32
IsValidSid
GetFileSecurityW
NotifyBootConfigStatus
CryptAcquireContextA
GetFileSecurityA
RegCloseKey
LookupAccountSidA
kernel32
FormatMessageW
IsBadReadPtr
GetSystemTimeAsFileTime
GetUserDefaultLCID
GetStringTypeExW
CloseHandle
GetSystemTimeAdjustment
IsBadWritePtr
GetLargestConsoleWindowSize
PeekConsoleInputW
VirtualLock
GlobalFree
GetTapeStatus
FillConsoleOutputCharacterA
InitializeCriticalSection
OpenSemaphoreW
FreeEnvironmentStringsA
QueryDosDeviceA
GetSystemDirectoryW
FindCloseChangeNotification
ExitProcess
Beep
SetHandleCount
GetThreadContext
GetDriveTypeA
WritePrivateProfileSectionA
FindResourceExA
VirtualProtect
GetEnvironmentVariableW
GetCommModemStatus
GetStartupInfoA
VirtualAlloc
FreeLibrary
GetUserDefaultLangID
UnmapViewOfFile
FindFirstFileW
ReadConsoleInputW
LocalReAlloc
FlushFileBuffers
SetThreadAffinityMask
CreateIoCompletionPort
SearchPathW
WritePrivateProfileStringW
FindFirstFileA
GetTapeParameters
SetTimeZoneInformation
SetEnvironmentVariableA
CreateProcessA
DeleteFiber
SetProcessWorkingSetSize
GlobalAddAtomW
OpenFile
AllocConsole
DosDateTimeToFileTime
VirtualQueryEx
_lread
LeaveCriticalSection
user32
MsgWaitForMultipleObjects
OemToCharBuffW
ReleaseDC
CopyImage
OpenInputDesktop
CascadeWindows
GetMenuDefaultItem
LoadImageA
GetClassInfoA
InsertMenuItemW
UnhookWindowsHookEx
GetDlgItem
GetClassInfoW
LoadBitmapA
WinHelpA
SetCaretPos
UnregisterDeviceNotification
GetNextDlgGroupItem
IsZoomed
CreateIcon
EndPaint
GetDlgItemTextW
DestroyAcceleratorTable
SetSysColors
GetUserObjectInformationA
SetRect
RemovePropA
SetCaretBlinkTime
RegisterClassA
CharNextW
RegisterDeviceNotificationW
msvcrt
mbstowcs
free
_i64tow
wcscspn
_mbsinc
_stricmp
realloc
_mbsnicmp
_snwprintf
_putenv
wcsncmp
_errno
memchr
_setmode
_strnicoll
_strupr
setlocale
_tzset
_sopen
rand
localtime
_wtoi
_lseek
wcslen
_fcvt
wcsncat
_vsnprintf
Sections
.text Size: 16KB - Virtual size: 234KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3.4MB - Virtual size: 3.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ