Static task
static1
Behavioral task
behavioral1
Sample
175268c0c8bee0581a6fab2d9e3f30e0_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
175268c0c8bee0581a6fab2d9e3f30e0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
175268c0c8bee0581a6fab2d9e3f30e0_JaffaCakes118
-
Size
224KB
-
MD5
175268c0c8bee0581a6fab2d9e3f30e0
-
SHA1
342022f9a4ee383b39431330095f51b99a9bdc1d
-
SHA256
6f86e035484d13801457b450531dae3e49fc16849c1bc97a2d27c1197f9d8f2f
-
SHA512
bde1f729bd625db8308c2d8a9dc52fb0f410de0ac42c5e4ded9c122ba6af46dca0fbc67488a5040a28d71f3d8e2037b8534fc60e9fd5c7b2dd269077b9efa5a1
-
SSDEEP
3072:tajTtAFkCtbT4dWgMMx5dnQ0DCDFUj00QCh14oqTsSkq:tMqbMxjBOxUj00V4obS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 175268c0c8bee0581a6fab2d9e3f30e0_JaffaCakes118
Files
-
175268c0c8bee0581a6fab2d9e3f30e0_JaffaCakes118.exe windows:4 windows x86 arch:x86
a0a50e4c78f0aaa1041c10b1bfa5e3bd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
Sleep
TerminateProcess
ReadFile
CreateProcessA
GetSystemDirectoryA
GetStdHandle
GetStartupInfoA
CreatePipe
ReleaseSemaphore
DeleteFileA
RemoveDirectoryA
GetFileAttributesA
FindClose
FindNextFileA
FindFirstFileA
FileTimeToSystemTime
GetTickCount
GetModuleHandleA
GetSystemInfo
GlobalMemoryStatus
GetDriveTypeA
OpenProcess
GetProcessTimes
ExitThread
GetComputerNameA
GetVersionExA
CreateSemaphoreA
GetCommandLineA
CreateThread
SetCurrentDirectoryA
CloseHandle
advapi32
RegQueryValueExA
RegCloseKey
GetUserNameA
RegOpenKeyExA
gdi32
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetDIBits
BitBlt
GetDeviceCaps
msvcrt
_close
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
_controlfp
_except_handler3
__set_app_type
longjmp
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
_iob
fprintf
strncpy
fflush
_ftol
atoi
sprintf
memset
_chkesp
strcmp
strlen
sscanf
memcmp
malloc
free
memcpy
strstr
_setjmp3
_write
_lseeki64
_open
strcpy
fclose
fread
fopen
fwrite
gmtime
abort
__getmainargs
psapi
EnumProcesses
GetProcessMemoryInfo
EnumProcessModules
GetModuleBaseNameA
user32
ReleaseDC
GetDC
SendInput
SetCursorPos
VkKeyScanA
ws2_32
select
shutdown
closesocket
recv
WSAStartup
WSASocketA
htons
bind
listen
accept
send
Sections
.text Size: 164KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
FCryptor Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ