Static task
static1
Behavioral task
behavioral1
Sample
0ee016504647032d49b2fc5ac6be93bd_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0ee016504647032d49b2fc5ac6be93bd_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0ee016504647032d49b2fc5ac6be93bd_JaffaCakes118
-
Size
196KB
-
MD5
0ee016504647032d49b2fc5ac6be93bd
-
SHA1
b80e23018cabd720e46102edfaea905fdd764a52
-
SHA256
9de4d601408442a8814cc25b4d34bf0263b5611f1443c27f749a628d28f3c0d7
-
SHA512
2a9e460ff57daac27690f114ef9e0bc9c3b0b39f611e6bb2dc9f42206f334b1d05e65ad4f885ad62ae7d0289d0a827feded7e96f597df1163363bd44da2ff48c
-
SSDEEP
3072:H+2wlmVm30lZQncB+O6pvhoep2dG/1h76SSlJ9aE9L:HlVC0l6cBLaZp2y776N9aSL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ee016504647032d49b2fc5ac6be93bd_JaffaCakes118
Files
-
0ee016504647032d49b2fc5ac6be93bd_JaffaCakes118.exe windows:4 windows x86 arch:x86
d867793bbdcfb45f04b5253c1ff95f59
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
HttpOpenRequestA
InternetQueryDataAvailable
InternetOpenA
InternetConnectA
HttpSendRequestA
HttpQueryInfoA
InternetCloseHandle
InternetReadFile
rpcrt4
UuidCreate
UuidToStringA
shlwapi
StrNCatA
StrToIntA
StrStrIA
wnsprintfA
iphlpapi
GetAdaptersInfo
kernel32
QueryPerformanceCounter
GetSystemInfo
GetStringTypeA
GetSystemTimeAsFileTime
SetStdHandle
FlushFileBuffers
GetLocaleInfoA
VirtualProtect
lstrlenA
lstrcpynA
lstrcatA
HeapFree
CloseHandle
WriteFile
SetFilePointer
ReadFile
HeapAlloc
GetProcessHeap
CreateFileA
GetWindowsDirectoryA
GetShortPathNameA
MoveFileExA
lstrcmpA
lstrcpyA
lstrcmpiA
DeleteFileA
GetSystemDirectoryA
GetProcAddress
LoadLibraryA
LockResource
SizeofResource
LoadResource
FindResourceA
SetFileAttributesA
SetFileTime
GetFileTime
VirtualQuery
GetTickCount
GetVolumeInformationA
WideCharToMultiByte
GetVersionExA
FindClose
FindFirstFileA
OpenFileMappingA
Module32Next
Module32First
CreateToolhelp32Snapshot
GetLocalTime
HeapReAlloc
GetCurrentThreadId
GetCurrentProcessId
Sleep
GetLastError
CreateMutexA
HeapDestroy
HeapCreate
LCMapStringW
GetComputerNameA
GetModuleHandleA
DeviceIoControl
ExitProcess
GetModuleFileNameA
GetTempPathA
TerminateProcess
GetCurrentProcess
GetStartupInfoA
GetCommandLineA
RtlUnwind
InterlockedExchange
VirtualFree
VirtualAlloc
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapSize
GetACP
GetOEMCP
GetCPInfo
LCMapStringA
MultiByteToWideChar
GetStringTypeW
user32
wsprintfA
GetClassNameA
GetWindowThreadProcessId
EnumWindows
advapi32
RegQueryValueExA
RegQueryValueA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegCreateKeyA
shell32
ShellExecuteA
Sections
.text Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 152KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ