Static task
static1
Behavioral task
behavioral1
Sample
278c635b7ccf8042e0cfa4b02df75865_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
278c635b7ccf8042e0cfa4b02df75865_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
278c635b7ccf8042e0cfa4b02df75865_JaffaCakes118
-
Size
50KB
-
MD5
278c635b7ccf8042e0cfa4b02df75865
-
SHA1
d07a7ae071444eeec3330c23423c5cbf761d61d0
-
SHA256
09be43fdfdec28516576fffa89626057825369eb63e81674fc8118a1d406db65
-
SHA512
64aa723e8b105a1ee5503018363bb702cd3b55907908a30dc966ac90e8dcf77adbce56fb7d9ad2a4a405f18149399890f9d04e9557b08beb2b57e04bd2a168c7
-
SSDEEP
768:GC2KrkIYf7oc8a6DP0x5FgLK9VEA2g26:N2nsc8a6D8x5RVEA2gZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 278c635b7ccf8042e0cfa4b02df75865_JaffaCakes118
Files
-
278c635b7ccf8042e0cfa4b02df75865_JaffaCakes118.exe windows:4 windows x86 arch:x86
ec05d06f765b42835a7a038989c7799b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
urlmon
URLDownloadToFileA
kernel32
lstrcmpiA
WaitForSingleObject
CreateProcessA
ExpandEnvironmentStringsA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LoadLibraryA
CloseHandle
GetCurrentProcess
ExitThread
ReleaseMutex
GetTickCount
CreateMutexA
GetLocaleInfoA
GetVersionExA
GetFileAttributesA
CopyFileA
SetFileAttributesA
GetWindowsDirectoryA
WriteFile
CreateFileA
GetTempPathA
lstrlenA
CreateDirectoryA
ExitProcess
GetDriveTypeA
GetLogicalDriveStringsA
GlobalFree
GlobalAlloc
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SetFilePointer
GetFileSize
FindClose
FindNextFileA
GetFullPathNameA
SetCurrentDirectoryA
FindFirstFileA
GlobalUnlock
GlobalLock
InterlockedDecrement
TerminateThread
TerminateProcess
OpenProcess
CreateThread
GetLastError
LocalFree
WideCharToMultiByte
GetStartupInfoA
Sleep
lstrcatA
user32
BringWindowToTop
GetWindowTextA
ShowWindow
keybd_event
VkKeyScanA
FindWindowA
CharLowerA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
BlockInput
EnumWindows
SetForegroundWindow
SetFocus
IsWindow
msvcrt
wcslen
_CxxThrowException
strstr
_strdup
_controlfp
__set_app_type
__p__fmode
??1type_info@@UAE@XZ
strlen
strcpy
strchr
memset
_snprintf
sprintf
memcmp
strncpy
srand
strtok
strcmp
_vsnprintf
??2@YAPAXI@Z
memcpy
_strlwr
rand
strcat
fread
fopen
free
strncat
malloc
_except_handler3
toupper
__CxxFrameHandler
atoi
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
advapi32
RegCloseKey
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
GetUserNameA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
SysFreeString
VariantClear
SysAllocString
VariantInit
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE