Static task
static1
Behavioral task
behavioral1
Sample
3258ef488d8bedd25ec6effc9fdd39d3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3258ef488d8bedd25ec6effc9fdd39d3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3258ef488d8bedd25ec6effc9fdd39d3_JaffaCakes118
-
Size
288KB
-
MD5
3258ef488d8bedd25ec6effc9fdd39d3
-
SHA1
f3f423e9fb3a4a37deb90d8716e0429bd3fa7cf8
-
SHA256
8bd1d42ffd6c0490601c9159ef291135d2ffc06c65323a787cb2ce10b21ae511
-
SHA512
c4acd6a8408e14fc675fc5eee594e709259d92d7c1f43c025222cb2789cd75a140c1afe020c8b7257e1f6abef3c0db956542f398d3e684d99a339cb13ce79b8d
-
SSDEEP
1536:5aPG3S8XrC5Btp7C3gu3NPxL3sUHjclRPvJ+q32HD41O5Oz8Zqz0oLtBA:4PG3PXrC5/p7C13sUIlf+l5VqQoLtBA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3258ef488d8bedd25ec6effc9fdd39d3_JaffaCakes118
Files
-
3258ef488d8bedd25ec6effc9fdd39d3_JaffaCakes118.exe windows:4 windows x86 arch:x86
fe8ab2301ddea1b52c296742cb8808a9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
FindNextFileA
FindClose
GetCurrentDirectoryA
CopyFileA
SetFileAttributesA
CreateDirectoryA
CreateFileA
WriteFile
CloseHandle
GetFileSize
DeleteFileA
GetModuleFileNameA
WaitForSingleObject
CreateSemaphoreA
GetLastError
GetCommandLineA
CreateToolhelp32Snapshot
Process32First
Process32Next
TerminateProcess
OpenProcess
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetFilePointer
SetCurrentDirectoryA
GetSystemTime
SystemTimeToFileTime
SetFileTime
GetVersionExA
FlushViewOfFile
GetDiskFreeSpaceA
lstrcmpA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
MultiByteToWideChar
WideCharToMultiByte
GetLocaleInfoA
GetStringTypeW
CreateThread
TerminateThread
ReadFile
Sleep
GetStringTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LCMapStringW
LCMapStringA
SetEndOfFile
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
InitializeCriticalSection
HeapSize
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
GetProcessHeap
GetStartupInfoA
RaiseException
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetProcAddress
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapDestroy
HeapCreate
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
user32
GetWindowTextA
PostMessageA
FindWindowA
IsWindowVisible
GetWindowRect
GetCursorPos
SetCursorPos
mouse_event
IsWindowEnabled
EnumChildWindows
GetClassNameA
advapi32
RegSetValueExA
RegOpenKeyA
RegCloseKey
shell32
ShellExecuteA
SHFileOperationA
wininet
InternetOpenA
HttpQueryInfoA
InternetReadFile
InternetOpenUrlA
InternetCloseHandle
ws2_32
WSAStartup
WSACleanup
gethostbyname
inet_ntoa
socket
htons
inet_addr
connect
recv
send
closesocket
Sections
.text Size: 84KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ