Static task
static1
Behavioral task
behavioral1
Sample
330ed0a5fd573ab43152090bc60042b1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
330ed0a5fd573ab43152090bc60042b1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
330ed0a5fd573ab43152090bc60042b1_JaffaCakes118
-
Size
98KB
-
MD5
330ed0a5fd573ab43152090bc60042b1
-
SHA1
1081201a7abe23f1ec664c2e6bd4cb19b60b8c9a
-
SHA256
ad51bc901b607800615a8b76bc8fcd2f437c9b336c65981864b2fa4589ad7313
-
SHA512
bbfa2a425b96cfa4fbef0bb4baeafecab6b6cf1b412249283aeeaf7abd844ddd6850d77f2886a6c172d8e92588343c3ed89bdac5d4214d6b5f4b3c869cdf1af5
-
SSDEEP
3072:n26XBfNtRGduJfr6Wl1eAkqTDw9iP9IJ:n26pRkUF9Ts9iP9I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 330ed0a5fd573ab43152090bc60042b1_JaffaCakes118
Files
-
330ed0a5fd573ab43152090bc60042b1_JaffaCakes118.exe windows:4 windows x86 arch:x86
008eac86c1498ccf441b07b02c359c03
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
HttpQueryInfoA
InternetQueryDataAvailable
InternetReadFile
HttpOpenRequestA
HttpSendRequestA
InternetConnectA
InternetCrackUrlA
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetSetOptionA
shlwapi
PathGetDriveNumberA
snmpapi
SnmpUtilOidCpy
msvcrt
??3@YAXPAX@Z
??2@YAPAXI@Z
sprintf
strncpy
div
__CxxFrameHandler
strncat
_except_handler3
memmove
_exit
_strlwr
_strdup
wcslen
_CxxThrowException
??1type_info@@UAE@XZ
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_onexit
__dllonexit
_controlfp
strstr
__set_app_type
kernel32
GetEnvironmentVariableA
GetStartupInfoA
GetCurrentProcess
TerminateProcess
LocalFree
WideCharToMultiByte
InterlockedDecrement
lstrlenA
MultiByteToWideChar
DeleteFileA
CreateProcessA
SetLastError
GetModuleFileNameA
GetLastError
GetVolumeInformationA
LoadLibraryA
FreeLibrary
SetFilePointer
ReadFile
GetTempPathA
GetTempFileNameA
WriteFile
DeviceIoControl
GetComputerNameA
GetVersion
CreateFileA
GetModuleHandleA
GetProcAddress
VirtualAlloc
VirtualFree
CloseHandle
GetTickCount
user32
CharToOemA
advapi32
GetUserNameA
shell32
SHGetSpecialFolderPathA
ShellExecuteExA
ole32
OleRun
CLSIDFromString
CoUninitialize
CoInitialize
CoCreateInstance
CLSIDFromProgID
oleaut32
VariantClear
SysFreeString
GetErrorInfo
SysAllocString
msvcp60
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Xran@std@@YAXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Xlen@std@@YAXXZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
Sections
.text Size: 91KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ