Static task
static1
Behavioral task
behavioral1
Sample
1a2ba5f184e0a58068a683226deb255c_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1a2ba5f184e0a58068a683226deb255c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1a2ba5f184e0a58068a683226deb255c_JaffaCakes118
-
Size
40KB
-
MD5
1a2ba5f184e0a58068a683226deb255c
-
SHA1
01bd0b2c32a7020a8f283db9fdcc106df47f737b
-
SHA256
b036e68944105ed203413a7f6285a3c910959cd36cdb8775970e6f513e77ff78
-
SHA512
8965219377c0bcbd9a9008327aaf55f9b86e664a840dca7db8b3a31058e8051a449841197dc1d34803912e2ad581a623c562f31cb9e440348a2f056a18ef09ba
-
SSDEEP
384:bsJqO2J8fEEQZVuwN7cltqBc6ulIpfdmA4Nh69qLbAxEhpm56OovKzZoDWsx/4Df:bs52J88EYVNqf+p0V5pm5ykoDp++y3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1a2ba5f184e0a58068a683226deb255c_JaffaCakes118
Files
-
1a2ba5f184e0a58068a683226deb255c_JaffaCakes118.exe windows:4 windows x86 arch:x86
d6b5cc5ac54996c1669b90ee6932771e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoW
GetTimeZoneInformation
GetLocalTime
GlobalAlloc
GetCurrentProcess
GetLastError
GetCurrentThread
GlobalFree
GetModuleFileNameW
WaitForMultipleObjects
SetErrorMode
Sleep
GetVersionExW
CreateFileW
CreateWaitableTimerW
CancelWaitableTimer
CreateEventW
ExitThread
GetTickCount
SizeofResource
LoadResource
FindResourceExW
GetModuleHandleW
GetTempPathW
GetCurrentThreadId
GetTempFileNameW
GetStartupInfoW
WriteFile
CreateProcessW
CloseHandle
LoadLibraryW
SetWaitableTimer
GetProcAddress
SearchPathA
GetFullPathNameA
MoveFileA
SetFileAttributesA
GetFileSize
GetModuleFileNameA
GetCommandLineA
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalLock
RemoveDirectoryA
GetTempFileNameA
lstrcatA
GetSystemDirectoryA
lstrcmpA
ExpandEnvironmentStringsA
WaitForSingleObject
GetModuleHandleA
LoadLibraryExA
GetPrivateProfileStringA
MulDiv
SetFilePointer
FindClose
FindNextFileA
DeleteFileA
user32
GetKeyboardLayoutList
PostQuitMessage
DispatchMessageW
TranslateMessage
GetMessageW
PostThreadMessageW
PeekMessageW
CharToOemBuffA
advapi32
GetTokenInformation
OpenProcessToken
OpenThreadToken
AllocateAndInitializeSid
EqualSid
wininet
InternetOpenW
InternetCrackUrlW
InternetCloseHandle
InternetReadFile
HttpQueryInfoW
HttpSendRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetConnectW
iphlpapi
GetAdaptersInfo
ws2_32
inet_addr
WSACleanup
WSAStartup
gethostbyname
dnsapi
DnsRecordListFree
DnsNameCompare_W
msvcrt
swscanf
strtok
sscanf
??3@YAXPAX@Z
_controlfp
_except_handler3
__set_app_type
??2@YAPAXI@Z
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
_XcptFilter
_exit
time
_wstrtime
_wstrdate
exit
malloc
wcslen
free
swprintf
wcscmp
_beginthreadex
realloc
wcsncpy
wcscat
wcscpy
_wstat
mbstowcs
wcstombs
_cexit
_c_exit
toupper
fprintf
isdigit
isspace
__initenv
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ