Static task
static1
Behavioral task
behavioral1
Sample
1780f08a040b7be4fc9ce930305661f4_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1780f08a040b7be4fc9ce930305661f4_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1780f08a040b7be4fc9ce930305661f4_JaffaCakes118
-
Size
172KB
-
MD5
1780f08a040b7be4fc9ce930305661f4
-
SHA1
d97e882d557c4ac99311239470a021133a517a92
-
SHA256
58d8b5e520d6da256cc0bb4a5ab860504137247fdfa7c87bc465b83abd7fc9cf
-
SHA512
88160503f7a4626be8d3930d2fa1c83f10cf3dc589cf32088b9b64befe305dc31f63aaff744ff93481b3c0b20b9700374e3bf378629803c3f6b4e3c4174f1c5e
-
SSDEEP
3072:e/bnSuNKCgdHrfXK8uBF89VshbzCJwGwPjF8+ySKZZZmZt:e/LdNQjXK5FiVshbzCFwPj8m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1780f08a040b7be4fc9ce930305661f4_JaffaCakes118
Files
-
1780f08a040b7be4fc9ce930305661f4_JaffaCakes118.exe windows:4 windows x86 arch:x86
924a9d2469618619d4b26569911466cc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
CreateMutexA
CopyFileA
GetModuleFileNameA
GetSystemDirectoryA
Sleep
WaitForMultipleObjects
ResetEvent
CreateEventA
CompareStringW
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
GetUserDefaultLCID
DeleteCriticalSection
GetLocaleInfoA
IsValidCodePage
IsValidLocale
LCMapStringW
LCMapStringA
SetEndOfFile
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
GetOEMCP
GetACP
FindFirstFileA
CreateFileA
FlushFileBuffers
SetStdHandle
WaitForSingleObject
TerminateThread
DeleteFileA
CloseHandle
GetCurrentThreadId
SetEvent
EnterCriticalSection
LeaveCriticalSection
GetComputerNameA
GetVersionExA
lstrcmpiA
GetDiskFreeSpaceExA
GlobalMemoryStatus
SetLastError
RemoveDirectoryA
CreateDirectoryA
EnumSystemLocalesA
SetConsoleCtrlHandler
VirtualAlloc
HeapReAlloc
HeapAlloc
FatalAppExitA
VirtualFree
HeapFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
SetEnvironmentVariableA
UnhandledExceptionFilter
GetCurrentThread
TlsFree
TlsAlloc
SetFilePointer
GetFileType
SetHandleCount
ReadFile
GetCurrentProcess
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
GetLastError
FindClose
GetLogicalDrives
GetDriveTypeA
GlobalAlloc
GlobalLock
GlobalUnlock
GetCPInfo
GlobalFree
TerminateProcess
InterlockedIncrement
LoadLibraryA
RtlUnwind
CreateThread
TlsSetValue
TlsGetValue
ExitThread
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
IsBadWritePtr
IsBadReadPtr
HeapValidate
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
GetProcAddress
user32
GetDC
DispatchMessageA
TranslateMessage
GetMessageA
RegisterClassExA
LoadCursorA
LoadIconA
UpdateWindow
ShowWindow
CreateWindowExA
DefWindowProcA
PostQuitMessage
SendMessageA
EndPaint
DrawTextA
GetClientRect
BeginPaint
keybd_event
mouse_event
ReleaseDC
gdi32
SelectPalette
CreateFontIndirectA
SetTextColor
SetBkMode
CreateDCA
GetDeviceCaps
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetObjectA
DeleteObject
DeleteDC
GetStockObject
RealizePalette
GetDIBits
ws2_32
inet_addr
bind
WSASocketA
listen
shutdown
closesocket
WSAGetOverlappedResult
WSAResetEvent
WSAWaitForMultipleEvents
WSAGetLastError
WSASend
WSARecv
inet_ntoa
WSAAccept
WSACloseEvent
WSAEventSelect
WSACreateEvent
WSACleanup
WSAStartup
WSASetEvent
gethostbyname
gethostname
htons
WSAEnumNetworkEvents
advapi32
RegOpenKeyExA
RegDeleteValueA
RegSetValueExA
RegDeleteKeyA
RegCreateKeyA
RegEnumKeyA
RegOpenKeyA
RegQueryValueExA
RegEnumValueA
RegCloseKey
GetUserNameA
shell32
ShellExecuteA
SHGetFileInfoA
Sections
.text Size: 132KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ