Static task
static1
Behavioral task
behavioral1
Sample
34fb57bab36ef3a56169edc304b1da82_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
34fb57bab36ef3a56169edc304b1da82_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
34fb57bab36ef3a56169edc304b1da82_JaffaCakes118
-
Size
84KB
-
MD5
34fb57bab36ef3a56169edc304b1da82
-
SHA1
ad190dd854473875ceffa79f62c614257d641d18
-
SHA256
00d208ae93fc77443facfadb95917b82f77f1ae7190cf8b02f8569690a75d35f
-
SHA512
38f2889156b4e69e56f4360f6c9d486de59d8477664b1eff1db5c8ca1ba526cae6435a279fe38b63aa00b06557ed3f071295356a31b2535becaf325f9ba5fc31
-
SSDEEP
1536:pOhXEupFC23lX9EKV0CPVteZbpvccbXtx84bVDlM+:Burd9EKlKRpvcd4hRM+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 34fb57bab36ef3a56169edc304b1da82_JaffaCakes118
Files
-
34fb57bab36ef3a56169edc304b1da82_JaffaCakes118.exe windows:4 windows x86 arch:x86
6e6bfbbaa3c08673055295f4faf2fcf2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
SHGetFileInfoA
SHGetSpecialFolderPathW
StrStrIA
wininet
InternetQueryOptionW
HttpQueryInfoW
InternetCloseHandle
InternetReadFile
InternetQueryDataAvailable
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetGetConnectedState
shlwapi
PathAppendA
PathFindExtensionA
PathAppendW
ntdll
strstr
strrchr
wcsstr
_wcsnicmp
atoi
_memicmp
sscanf
sprintf
_vsnprintf
_snprintf
wcsrchr
_snwprintf
strchr
_strnicmp
isxdigit
wcscmp
wcslen
memmove
strncmp
vsprintf
strncpy
_chkstk
ws2_32
inet_addr
closesocket
connect
ioctlsocket
socket
htons
sendto
send
WSAStartup
inet_ntoa
getpeername
ntohs
setsockopt
select
recv
WSACleanup
gethostbyname
msvcrt
??2@YAPAXI@Z
malloc
calloc
realloc
free
strtok
srand
rand
??3@YAXPAX@Z
kernel32
GetFileTime
lstrcatA
GetProcessHeap
WriteFile
FileTimeToSystemTime
CreateRemoteThread
VirtualFreeEx
VirtualProtect
OpenProcess
VirtualAllocEx
WriteProcessMemory
ReadProcessMemory
InterlockedIncrement
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
OpenFileMappingA
ReleaseMutex
GetWindowsDirectoryA
OpenMutexA
GetModuleFileNameA
CreateDirectoryA
GetFileSize
LockFile
SetCurrentDirectoryA
FindFirstFileA
FindNextFileA
FindClose
DeleteFileW
GetTempFileNameW
FlushFileBuffers
DisconnectNamedPipe
CreateNamedPipeA
ConnectNamedPipe
CreateMutexA
InitializeCriticalSection
ReadFile
GetVersionExA
GetLocaleInfoA
GetModuleFileNameW
lstrcpynW
GetVolumeInformationW
HeapReAlloc
lstrcatW
GetSystemTime
CreateThread
WaitForSingleObject
Beep
EnterCriticalSection
LeaveCriticalSection
CreateProcessW
GetWindowsDirectoryW
CreateFileW
GetLastError
lstrcpyA
MoveFileExA
lstrcmpA
WideCharToMultiByte
MoveFileExW
lstrcmpW
ExitThread
DeleteFileA
SetFileAttributesA
lstrlenA
GetFileAttributesA
SetFileAttributesW
GetFileAttributesW
MultiByteToWideChar
HeapFree
HeapAlloc
lstrcpyW
ExitProcess
GetTickCount
lstrcpynA
Sleep
GetCurrentThreadId
SetFilePointer
DeviceIoControl
CreateFileA
VirtualAlloc
CloseHandle
CopyFileW
user32
GetMessageA
RegisterDeviceNotificationA
TranslateMessage
RegisterClassExA
DispatchMessageA
DefWindowProcA
MessageBoxA
CreateWindowExA
wvsprintfA
advapi32
RegCloseKey
LookupPrivilegeValueA
OpenProcessToken
CryptGetHashParam
CryptDestroyHash
RegCreateKeyExW
RegSetValueExW
AdjustTokenPrivileges
CryptAcquireContextA
CryptCreateHash
CryptReleaseContext
CryptHashData
ole32
CoInitialize
CoCreateInstance
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ