Static task
static1
Behavioral task
behavioral1
Sample
44f3227257994e6b051676840d324295_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
44f3227257994e6b051676840d324295_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
44f3227257994e6b051676840d324295_JaffaCakes118
-
Size
96KB
-
MD5
44f3227257994e6b051676840d324295
-
SHA1
b455dc5c41ad01914d67312bf5480e2e18f91748
-
SHA256
506c9265bed4071db049db9b9bf94d8caa908d3e6b171ad353ab246a7f1e203b
-
SHA512
101f2e64bed6ba640475f9d4c964518c2cccad6c947b620bbbdcdcf67839e72e930affaf83f5b1b7103696d40a492b5189cb0aeb1b3dfbc5c2ae57badceab88a
-
SSDEEP
1536:EZjjbUpLykoAKh1o0PSqbe3j7d0Yl/TyC9R6z8W3J7PVsuiZae//x2N4Yjszs:EZwpL1Wh1zaqi3uO/hQJ7PyHZ9/7U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44f3227257994e6b051676840d324295_JaffaCakes118
Files
-
44f3227257994e6b051676840d324295_JaffaCakes118.exe windows:5 windows x86 arch:x86
001f79fcd3f02e15b6ce3a0f62930c1c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dnsapi
DnsQuery_A
DnsFree
secur32
ApplyControlToken
InitializeSecurityContextA
DecryptMessage
EncryptMessage
AcquireCredentialsHandleW
FreeContextBuffer
QueryContextAttributesW
DeleteSecurityContext
FreeCredentialsHandle
InitializeSecurityContextW
shell32
SHGetFileInfoA
ShellExecuteA
SHGetSpecialFolderPathW
wininet
InternetQueryDataAvailable
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
HttpQueryInfoW
InternetQueryOptionW
InternetCloseHandle
InternetReadFile
shlwapi
PathAppendW
StrStrIA
PathAppendA
PathFindExtensionA
ws2_32
closesocket
connect
htons
send
WSAStartup
WSACleanup
inet_addr
inet_ntoa
WSAGetLastError
recv
setsockopt
ioctlsocket
select
ntohs
gethostbyname
sendto
getpeername
socket
msvcrt
strncat
isalnum
vsprintf
strrchr
toupper
strncmp
memmove
isxdigit
_strnicmp
??2@YAPAXI@Z
_snwprintf
strchr
strtok
_stricmp
_vsnprintf
_wcsnicmp
_memicmp
strncpy
sprintf
_snprintf
printf
_strcmpi
sscanf
atoi
??3@YAXPAX@Z
wcsrchr
strstr
wcsstr
memset
kernel32
GetWindowsDirectoryA
GetModuleFileNameA
OpenMutexA
GetLogicalDriveStringsA
CreateDirectoryA
GetFileSize
LockFile
SetCurrentDirectoryA
FindFirstFileA
FindNextFileA
FindClose
CopyFileW
FlushFileBuffers
GetLocaleInfoA
GetVolumeInformationW
lstrcatA
ExitProcess
CreateProcessW
VirtualAlloc
DeviceIoControl
SetFilePointer
lstrcpynA
LocalAlloc
LocalFree
lstrcpyW
SetFileAttributesA
DeleteFileA
lstrcpynW
lstrcatW
GetTempFileNameW
DeleteFileW
GetWindowsDirectoryW
CreateThread
InterlockedCompareExchange
GetModuleFileNameW
GetVersionExA
CreateMutexA
UnmapViewOfFile
InterlockedIncrement
CreateFileMappingA
OpenFileMappingA
MapViewOfFile
ReleaseMutex
WaitForSingleObject
OpenProcess
CreateRemoteThread
IsWow64Process
VirtualAllocEx
VirtualFreeEx
CreateFileA
WaitForMultipleObjects
GetOverlappedResult
DisconnectNamedPipe
lstrcpyA
MoveFileExA
lstrcmpA
WideCharToMultiByte
MoveFileExW
lstrcmpW
ExitThread
MultiByteToWideChar
GetFileAttributesA
SetFileAttributesW
GetFileAttributesW
LoadLibraryW
CloseHandle
SetFileTime
CreateFileW
GetFileTime
GetSystemTimeAsFileTime
WriteFile
GetModuleHandleW
GetLastError
ReadFile
GetTickCount
HeapAlloc
GetProcessHeap
HeapFree
lstrlenA
Sleep
WriteProcessMemory
ReadProcessMemory
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
SetEvent
ConnectNamedPipe
CreateNamedPipeA
CreateEventA
user32
RegisterClassExA
CreateWindowExA
RegisterDeviceNotificationA
GetMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
wsprintfW
wvsprintfA
MessageBoxA
advapi32
RegSetValueExW
CryptDestroyHash
CryptHashData
RegOpenKeyExA
RegSetValueExA
RegNotifyChangeKeyValue
RegCreateKeyExW
CryptGetHashParam
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
CryptAcquireContextA
CryptCreateHash
CryptReleaseContext
ole32
CoInitialize
CoCreateInstance
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 219KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
SEPE Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE