Static task
static1
Behavioral task
behavioral1
Sample
2aa708bd9afaa4937597ce780b6473fd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2aa708bd9afaa4937597ce780b6473fd_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2aa708bd9afaa4937597ce780b6473fd_JaffaCakes118
-
Size
12KB
-
MD5
2aa708bd9afaa4937597ce780b6473fd
-
SHA1
8358fb0690fc271ca245af525aeb60c3733f5ca9
-
SHA256
f52f4495bad32471ca1ca25f79e9c4b2a9b374f0c654d3f904948f31ae5483c4
-
SHA512
dfd569447b51a5036ed4de7262cb16498dc0fba7dc26c5e9fb1ecafcd377a500b8b7687403b17b1e344424ccab4442bf2d3eaa9fd9a342f5d39f737249001d88
-
SSDEEP
192:B3zx0hmVA0Rz6Vr3N7nN5Za+si9M1uGVh15F3Uc09qbp:xzKmVA0Rz6Vr3N7nHg+sgM1XV/4c09K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2aa708bd9afaa4937597ce780b6473fd_JaffaCakes118
Files
-
2aa708bd9afaa4937597ce780b6473fd_JaffaCakes118.exe windows:4 windows x86 arch:x86
9a9e9936c53c8a97791e7d1391e5f094
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msto32
UninstallHook
InstallHook
user32
SetTimer
SendMessageA
RegisterClassExA
PostQuitMessage
OpenClipboard
KillTimer
GetWindowTextA
GetMessageA
TranslateMessage
GetClipboardData
GetClassNameA
FindWindowExA
FindWindowA
DispatchMessageA
DefWindowProcA
CreateWindowExA
CloseClipboard
wsprintfA
GetForegroundWindow
kernel32
GlobalLock
SetFilePointer
GlobalFree
lstrlenA
lstrcpynA
lstrcpyA
lstrcmpA
lstrcatA
WriteFile
WinExec
Sleep
GlobalAlloc
ReadFile
Process32Next
Process32First
CloseHandle
CreateFileA
CreateThread
CreateToolhelp32Snapshot
DeleteFileA
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
GetCommandLineA
GetFileSize
GetModuleHandleA
GetSystemDirectoryA
GetSystemTime
GetWindowsDirectoryA
GlobalUnlock
advapi32
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
GetUserNameA
RegOpenKeyA
wsock32
send
recv
listen
inet_ntoa
inet_addr
htons
gethostbyname
connect
closesocket
WSACleanup
accept
socket
WSAStartup
WSAAsyncSelect
bind
wininet
InternetOpenUrlA
InternetOpenA
InternetGetConnectedState
InternetConnectA
InternetCloseHandle
FtpPutFileA
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
DeleteUrlCacheEntryA
InternetReadFile
urlmon
URLDownloadToFileA
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE