Static task
static1
Behavioral task
behavioral1
Sample
3c514b1a6f2715b021b54b8d5b8e7c12_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3c514b1a6f2715b021b54b8d5b8e7c12_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3c514b1a6f2715b021b54b8d5b8e7c12_JaffaCakes118
-
Size
158KB
-
MD5
3c514b1a6f2715b021b54b8d5b8e7c12
-
SHA1
2a9bc9616d1909e3ca3b49d56ba3fd3fafc469bc
-
SHA256
f7f45e759a932dd073845d6aa60bbf46258eb7b55c557406e72547c69d1ad66b
-
SHA512
4ab3813c1dc9340289e93fc2375d304364943d5368429df6a746f050dc1ef104a425e09731757bc4084256f8ad13431a7c29ec93577d3426906fff4b4697c1e9
-
SSDEEP
3072:FgvJLPOIMMBW7a/2ThvdjbX+yIXNvIDrHbJbYDcetEPN6vnrxGzH1+shdH6Pr1fu:4JyIMMBW7a/2ThvdjbX+yIXNv+rHbJb/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c514b1a6f2715b021b54b8d5b8e7c12_JaffaCakes118
Files
-
3c514b1a6f2715b021b54b8d5b8e7c12_JaffaCakes118.exe windows:4 windows x86 arch:x86
ffbeb5c8e3a1912a2a7258c3e9abbfbb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
GetUserNameA
RegCloseKey
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
kernel32
AddAtomA
CloseHandle
CopyFileA
CreateDirectoryA
CreateSemaphoreA
CreateThread
CreateToolhelp32Snapshot
DeleteFileA
ExitProcess
FindAtomA
FindFirstFileA
FindNextFileA
GetAtomNameA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
OpenProcess
Process32First
Process32Next
ReleaseSemaphore
SetCurrentDirectoryA
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_filbuf
_iob
_onexit
_setmode
abort
atexit
exit
fclose
fflush
fopen
fprintf
free
fseek
ftell
getenv
malloc
memchr
memcpy
memmove
memset
printf
rewind
signal
sprintf
strcat
strcmp
strcpy
strlen
strtok
shell32
ShellExecuteA
user32
GetAsyncKeyState
GetForegroundWindow
GetKeyState
GetWindowTextA
MessageBoxA
SendMessageA
wininet
FtpPutFileA
InternetCloseHandle
InternetConnectA
InternetOpenA
winmm
mciSendStringA
ws2_32
WSACleanup
WSAStartup
closesocket
connect
htons
inet_addr
recv
send
socket
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 368B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 42KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE