Static task
static1
Behavioral task
behavioral1
Sample
34779fd031a7a3b80fa8435af3196258_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
34779fd031a7a3b80fa8435af3196258_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
34779fd031a7a3b80fa8435af3196258_JaffaCakes118
-
Size
1.4MB
-
MD5
34779fd031a7a3b80fa8435af3196258
-
SHA1
118bdf102286b37313824698d1450e44a4baff47
-
SHA256
bfa60f2be931ea82cf8b5b915467773d74c0c84fa70acee07d4954f223a37dce
-
SHA512
17c8cac0c8304cb7e1e02061cfa8e361f0359bad2ec458e6ccbd652a2e85a2f9fa44899164b4d6c6883a2be1ce17d6e14a4d676fb0997c7d6d9df331c8eac2e5
-
SSDEEP
12288:CDKBNAi3drq/lMbNGrwb/z9odj9WAxVNKmFxHtCQtvaOv0ztyVbR68UF6LDdVY:C+DAm53SdjPxVNKmFxH88aFtyVi2A
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 34779fd031a7a3b80fa8435af3196258_JaffaCakes118
Files
-
34779fd031a7a3b80fa8435af3196258_JaffaCakes118.exe windows:4 windows x86 arch:x86
2804665cf904225933a02364318b2334
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetAttemptConnect
mfc71
ord5211
ord4720
ord4262
ord651
ord416
ord5613
ord6090
ord3667
ord3552
ord3668
ord3553
ord2036
ord4797
ord4213
ord519
ord718
ord3132
ord3133
ord516
ord518
ord5071
ord4542
ord709
ord4761
ord4001
ord4123
ord501
ord4580
ord1327
ord4583
ord1582
ord5212
ord4280
ord1521
ord4272
ord721
ord5702
ord528
ord524
ord526
ord5475
ord4867
ord3071
ord980
ord784
ord1084
ord1489
ord6118
ord299
ord2933
ord266
ord2321
ord907
ord2324
ord3934
ord3684
ord3563
ord1645
ord1586
ord730
ord4109
ord2272
ord3369
ord1903
ord3304
ord3997
ord3357
ord3761
ord6068
ord5991
ord4888
ord2372
ord5203
ord2654
ord5833
ord2169
ord1376
ord3641
ord3441
ord4212
ord4735
ord605
ord354
ord1892
ord5994
ord2657
ord2371
ord2164
ord2086
ord1545
ord4232
ord3164
ord587
ord2168
ord1931
ord1483
ord4098
ord2089
ord1547
ord4234
ord3171
ord591
ord4108
ord3414
ord4692
ord1635
ord1543
ord3157
ord583
ord3182
ord4353
ord911
ord1916
ord865
ord6063
ord3758
ord6236
ord5403
ord2468
ord1123
ord1122
ord1401
ord2899
ord4104
ord3683
ord1191
ord1187
ord2131
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord3948
ord4568
ord5230
ord5213
ord5566
ord2838
ord4481
ord3333
ord675
ord757
ord442
ord566
ord1074
ord2248
ord1279
ord347
ord4541
ord6205
ord6178
ord6172
ord4081
ord4044
ord548
ord6180
ord6174
ord1100
ord1054
ord4100
ord2094
ord3244
ord1955
ord1283
ord908
ord4115
ord628
ord1247
ord1248
ord265
ord1971
ord3952
ord2585
ord1101
ord2368
ord589
ord1425
ord6168
ord5642
ord330
ord3255
ord1580
ord5331
ord6297
ord5320
ord6286
ord2346
ord6138
ord2451
ord1258
ord3879
ord1790
ord620
ord1554
ord3195
ord5868
ord2867
ord2876
ord3799
ord378
ord3286
ord5637
ord1929
ord5644
ord6120
ord3576
ord3204
ord5731
ord3401
ord2367
ord4749
ord1654
ord1598
ord2987
ord3328
ord754
ord1395
ord5235
ord5233
ord2390
ord2400
ord2398
ord2396
ord2392
ord2415
ord2403
ord300
ord783
ord5912
ord1207
ord1551
ord1670
ord1671
ord2020
ord4890
ord4736
ord5182
ord4190
ord4844
ord4617
ord2882
ord2322
ord1486
ord2866
ord3875
ord1564
ord2370
ord2325
ord6067
ord5873
ord715
ord3292
ord4244
ord1581
ord1643
ord658
ord3230
ord2958
ord4238
ord1571
ord1641
ord2092
ord741
ord572
ord3317
ord4261
ord4486
ord3949
ord2644
ord3709
ord3719
ord3718
ord2991
ord2533
ord2646
ord2540
ord2862
ord2714
ord4307
ord2835
ord2731
ord2537
ord5200
ord1599
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2408
ord2413
ord2394
ord2410
ord934
ord930
ord932
ord928
ord923
ord5960
ord1600
ord4282
ord4722
ord3403
ord5214
ord4185
ord6275
ord5073
ord1908
ord5152
ord4240
ord1402
ord3946
ord1617
ord1620
ord5915
ord1591
ord2095
ord4125
ord762
ord1482
ord1063
ord1280
ord3161
ord304
ord5529
ord2902
ord5563
ord781
ord1934
ord3210
ord310
ord4035
ord297
ord578
ord1794
ord876
ord764
ord4085
msvcr71
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
??1exception@@UAE@XZ
??0exception@@QAE@XZ
__CxxFrameHandler
_CxxThrowException
??0exception@@QAE@ABV0@@Z
memcpy
atol
memset
isdigit
memmove
_mbsicmp
atoi
_mbschr
malloc
free
_resetstkoflw
_except_handler3
wcscpy
_setmbcp
_mbstok
strtok
_stricmp
exit
strncmp
strchr
strncat
_wcsupr
_ismbcdigit
strcat
isspace
strcmp
strpbrk
strrchr
strstr
_strlwr
_strupr
_mbctype
_mbclen
_mbsupr
_mbslwr
_mbsinc
_mbslen
_mbsnbicmp
_mbsnbcmp
_mbscmp
_mbsstr
_mbsrchr
_mbspbrk
_mbsnbcat
wcslen
realloc
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__security_error_handler
iswspace
_controlfp
_splitpath
strcpy
sprintf
fclose
fopen
_strdup
_ismbcspace
_access
strlen
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
_local_unwind2
memcmp
_atoi64
_time64
_vsnprintf
_snprintf
_purecall
_mbsnbcpy
_stat
kernel32
RaiseException
GetSystemTime
GetLocalTime
GetDateFormatA
GetTimeFormatA
OpenEventA
SetEvent
SetProcessShutdownParameters
LoadLibraryA
CreateMutexA
Sleep
GetCurrentDirectoryA
GetStringTypeExW
GetStringTypeExA
GetEnvironmentVariableW
GetEnvironmentVariableA
CompareStringW
CompareStringA
LocalFree
GetFileAttributesA
SetFileAttributesA
OpenMutexA
GetModuleFileNameA
GetCurrentProcess
lstrlenA
lstrcmpiW
lstrlenW
lstrcmpiA
GetVersion
InitializeCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetCurrentThreadId
CreateProcessA
CloseHandle
InterlockedDecrement
InterlockedIncrement
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetDiskFreeSpaceExA
GetFileSize
CreateFileA
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
SetLastError
OpenProcess
WaitForMultipleObjects
CreateEventA
GetStartupInfoA
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
DeleteCriticalSection
GetWindowsDirectoryA
GetSystemDirectoryA
ResetEvent
WaitForSingleObject
IsBadCodePtr
GetProcAddress
GetModuleHandleA
CreateThread
HeapFree
HeapAlloc
GetProcessHeap
LeaveCriticalSection
EnterCriticalSection
CopyFileA
MoveFileA
FreeLibrary
SetErrorMode
LoadLibraryExA
HeapReAlloc
GetLastError
HeapSize
OutputDebugStringA
IsBadStringPtrA
IsBadWritePtr
GetDriveTypeA
CreateDirectoryA
RemoveDirectoryA
SetCurrentDirectoryA
VerLanguageNameA
GetSystemDefaultLangID
GetUserDefaultLangID
lstrcmpA
LocalAlloc
ReleaseMutex
PulseEvent
CreateSemaphoreA
ReleaseSemaphore
HeapDestroy
TerminateThread
user32
PostMessageA
LoadBitmapA
PeekMessageA
InvalidateRgn
LoadImageA
SetWindowPos
DrawIcon
IsIconic
ReleaseDC
wsprintfA
TranslateMessage
DispatchMessageA
ScreenToClient
GetCursorPos
GetShellWindow
UnregisterClassA
GetParent
InvalidateRect
DrawTextA
DrawFocusRect
SetRectEmpty
RegisterHotKey
UnregisterHotKey
ExitWindowsEx
LoadIconA
FlashWindow
RedrawWindow
SetMenu
LoadMenuA
RemoveMenu
SetMenuDefaultItem
MessageBoxA
EnumWindows
SendMessageTimeoutA
GetDesktopWindow
GetDC
CharUpperW
CharUpperA
CharLowerW
CharLowerA
RegisterWindowMessageA
LoadAcceleratorsA
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
GetActiveWindow
BringWindowToTop
SwitchToThisWindow
GetWindow
SetCursor
GetWindowLongA
GetClassNameA
GetSystemMetrics
IsWindow
TranslateAcceleratorA
SetForegroundWindow
GetNextDlgTabItem
IsWindowVisible
GetSystemMenu
GetMenu
EnableMenuItem
GetSysColor
MessageBeep
GetCursor
LoadCursorA
GetFocus
KillTimer
SetTimer
SendMessageA
EnableWindow
GetClientRect
GetWindowRect
CharPrevA
GetDlgItemTextA
LoadStringA
MsgWaitForMultipleObjects
gdi32
SelectObject
DPtoLP
DeleteDC
CreateBitmap
CreateCompatibleBitmap
GetMapMode
SetMapMode
SetBkColor
DeleteObject
GetDIBColorTable
GetStockObject
BitBlt
RealizePalette
CreateCompatibleDC
GetDeviceCaps
GetObjectA
CreateFontIndirectA
GetTextExtentPoint32A
comctl32
ImageList_AddMasked
ord17
ole32
CoUninitialize
CoCreateInstance
OleRun
CoInitialize
CoInitializeSecurity
oleaut32
SetErrorInfo
VariantCopy
VariantClear
VariantInit
SysAllocString
SysFreeString
SysStringLen
SysStringByteLen
SysAllocStringByteLen
GetErrorInfo
VariantChangeType
CreateErrorInfo
msvcp71
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??_D?$basic_fstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?close@?$basic_fstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?get@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@AAD@Z
?open@?$basic_fstream@DU?$char_traits@D@std@@@std@@QAEXPBDHH@Z
??0?$basic_fstream@DU?$char_traits@D@std@@@std@@QAE@XZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
??$?6U?$char_traits@D@std@@@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
??0?$basic_fstream@DU?$char_traits@D@std@@@std@@QAE@PBDHH@Z
?seekp@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@JH@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
Sections
.text Size: 648KB - Virtual size: 646KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 176KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 452KB - Virtual size: 450KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.lrdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE