Static task
static1
Behavioral task
behavioral1
Sample
350f43e5150648bf70f2baed24f766de_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
350f43e5150648bf70f2baed24f766de_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
350f43e5150648bf70f2baed24f766de_JaffaCakes118
-
Size
103KB
-
MD5
350f43e5150648bf70f2baed24f766de
-
SHA1
820eb5e07de2631de3c875c56153289a274683d2
-
SHA256
73f6255438457d66a2c8e85702859b104a4f084368edbd1954cb7a2d680630ff
-
SHA512
f92894111bfb82641c3d489b7fee6da35e3cebfcbb07c52da363bc0b9e478d8a93bda9285ef8b923aa60b5556cd1eafccdbd4cff2d240cf40ca16f082e4fe5b5
-
SSDEEP
768:n22i89zQLVg0+2JLVYCuD8wuHpYs1mniaIc60mEZA:n22iIQVQEYRuF1mzIx0vq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 350f43e5150648bf70f2baed24f766de_JaffaCakes118
Files
-
350f43e5150648bf70f2baed24f766de_JaffaCakes118.exe windows:4 windows x86 arch:x86
894ac94d6433d0e98104db418444c294
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42d
ord4216
ord2078
ord1310
ord1857
ord3069
ord3944
ord3670
ord2076
ord1566
ord5078
ord3001
ord4064
ord1343
ord4190
ord1830
ord1631
ord4205
ord2340
ord2481
ord2584
ord3691
ord2473
ord2585
ord2341
ord2432
ord2339
ord3143
ord3144
ord3142
ord2431
ord3367
ord3786
ord3664
ord4492
ord684
ord704
ord492
ord526
ord728
ord3551
ord2448
ord1284
ord2020
ord1523
ord5103
ord683
ord4125
ord880
ord484
ord734
ord945
ord736
ord593
ord1511
ord813
ord3554
ord4403
ord2489
ord2492
ord3343
ord3338
ord2142
ord2133
ord824
ord4405
ord485
ord345
ord812
ord2168
ord4448
ord487
ord1510
ord3618
ord814
ord4443
ord4258
ord714
ord2636
ord4447
ord590
ord4123
ord342
ord3803
ord3552
ord5077
ord3702
ord1880
ord1860
ord4415
ord3231
ord1033
ord4130
ord1789
ord2661
ord4227
ord4229
ord2104
ord3366
ord3826
ord4239
ord4215
ord4408
ord3784
ord3657
ord2021
ord1285
ord2986
ord528
ord706
ord4195
ord3629
ord3948
ord4017
ord1862
ord4753
ord1364
ord4176
ord4208
ord3002
ord1344
ord4191
ord3658
ord1952
ord1228
ord2875
ord574
ord3432
ord1087
ord317
ord3524
ord4676
ord3831
ord3960
ord646
ord1906
ord3201
ord5072
ord2324
ord454
ord4475
ord2993
ord413
ord3365
ord944
ord735
ord5076
ord4118
ord1781
ord4175
ord3651
ord1365
ord3362
ord4756
ord3379
ord4002
ord4004
ord3725
ord3728
ord3726
ord3738
ord3739
ord3729
ord3970
ord3836
ord3616
ord3611
ord4068
ord3972
ord3627
ord3978
ord3757
ord3758
ord1490
ord719
ord5086
ord730
msvcrtd
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
??3@YAXPAX@Z
strlen
_chkesp
_CxxThrowException
fclose
fseek
fread
fopen
memcpy
memset
strncmp
__CxxFrameHandler
kernel32
FindResourceA
GetTickCount
CreateThread
GetLogicalDriveStringsA
LoadResource
lstrlenA
SetLocalTime
GetModuleHandleA
GetStartupInfoA
LockResource
SizeofResource
BeginUpdateResourceA
UpdateResourceA
EndUpdateResourceA
GetSystemDirectoryA
Sleep
GetModuleFileNameA
CreateProcessA
CopyFileA
SetFileAttributesA
user32
GetClassNameA
PostMessageA
GetSystemMetrics
GetForegroundWindow
SetWindowTextA
GetWindow
advapi32
RegCreateKeyA
RegSetValueA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegDeleteKeyA
ws2_32
WSACleanup
closesocket
sendto
htonl
inet_addr
htons
setsockopt
socket
WSAStartup
Sections
.data Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ