Static task
static1
Behavioral task
behavioral1
Sample
17453b92f5977cb9996aedc40470535e_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
17453b92f5977cb9996aedc40470535e_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
17453b92f5977cb9996aedc40470535e_JaffaCakes118
-
Size
4.5MB
-
MD5
17453b92f5977cb9996aedc40470535e
-
SHA1
2250db384132ca5a69505edd8843f7543d50e630
-
SHA256
d512dff729da775870af060d0609cc34688bc7b1bf42e61dacf9e4f8649f6391
-
SHA512
b134b9eec8e042f5a44789b349f5c8b881b2b6c5a2ef554e168a3c96c523647e0e2fb3937db5986604a4fb29460fbea6dcb3fa3c6a323db655161aeb1bbf4cee
-
SSDEEP
49152:c65bavJew8vSSj6w3yzO4hhCRbA3o8jNI6qoHou+jyEON:c65bavWaSjpCzOuhCROo8jNI6qQgyEG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17453b92f5977cb9996aedc40470535e_JaffaCakes118
Files
-
17453b92f5977cb9996aedc40470535e_JaffaCakes118.exe windows:4 windows x86 arch:x86
efffd564e172644da0d5be8a0922c1d0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddAtomA
CloseHandle
CreateEventA
CreateSemaphoreA
CreateToolhelp32Snapshot
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FileTimeToSystemTime
FindAtomA
FormatMessageA
FreeLibrary
GetAtomNameA
GetCurrentProcess
GetCurrentProcessId
GetLastError
GetModuleFileNameA
GetProcAddress
GetProcessTimes
GlobalMemoryStatus
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
LeaveCriticalSection
LoadLibraryA
LocalFree
Process32First
Process32Next
ReleaseSemaphore
SetEvent
SetLastError
SetPriorityClass
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualQuery
WaitForSingleObject
msvcrt
_fdopen
_itoa
_read
_strdup
_write
_HUGE
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_assert
_atoi64
_beginthread
_cexit
_ctype
_errno
_filbuf
_filelengthi64
_fstati64
_ftime
_iob
_isctype
_lseeki64
_onexit
_pclose
_pctype
_popen
_setjmp
_setmode
_stricmp
_strnicmp
_vsnprintf
abort
acos
asin
atan
atan2
atexit
atof
atoi
ceil
clearerr
clock
cos
cosh
ctime
difftime
exit
exp
fclose
fflush
fgetc
fgetpos
fgets
floor
fmod
fopen
fprintf
fputc
fputs
fread
free
frexp
fscanf
fseek
fsetpos
ftell
fwrite
getc
getenv
gmtime
ispunct
isspace
ldexp
localeconv
localtime
log
log10
longjmp
malloc
memchr
memcmp
memcpy
memmove
memset
mktime
modf
pow
printf
putc
rand
realloc
remove
rename
setlocale
setvbuf
signal
sin
sinh
sprintf
sqrt
srand
strcat
strchr
strcmp
strcoll
strcpy
strcspn
strerror
strftime
strlen
strncat
strncpy
strpbrk
strrchr
strstr
strtod
strtol
strtoul
strxfrm
system
tan
tanh
time
tmpfile
tmpnam
tolower
toupper
ungetc
user32
MessageBoxA
wsock32
WSACleanup
WSAGetLastError
WSAStartup
accept
bind
closesocket
gethostbyname
gethostname
getpeername
htonl
htons
inet_addr
ioctlsocket
listen
recv
select
send
socket
libxml2
xmlAddChild
xmlDocDumpMemory
xmlDocGetRootElement
xmlDocSetRootElement
xmlFree
xmlFreeDoc
xmlGetProp
xmlMutexLock
xmlMutexUnlock
xmlNewChild
xmlNewDoc
xmlNewDocNode
xmlNewMutex
xmlNewNode
xmlNewProp
xmlNewTextChild
xmlParseFile
xmlSaveFile
xmlSaveFormatFileEnc
xmlSetProp
xmlStrEqual
xmlStrcmp
xmlSubstituteEntitiesDefault
Sections
.text Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.stab Size: 121KB - Virtual size: 121KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.stabstr Size: 18KB - Virtual size: 17KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ