Static task
static1
Behavioral task
behavioral1
Sample
48acb1897addbfa69fcec55513136fdb_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
48acb1897addbfa69fcec55513136fdb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
48acb1897addbfa69fcec55513136fdb_JaffaCakes118
-
Size
212KB
-
MD5
48acb1897addbfa69fcec55513136fdb
-
SHA1
ae6a0c8c818eaf728b53bf624fb0a2552ddabe5b
-
SHA256
8903433feeff38a52708f1482c6470c4b10bee35bb68d212695a4e2d9f5855c3
-
SHA512
257d7db99bef858e5ea0c0f4842c9b50f332772717437969a0392c55307cb9e6d8c630ed9f9f6680262c27c398032ef7b0924feed0d2fdc415aec71ae8260239
-
SSDEEP
6144:U2VZtrza09Ke0gYvklLN4Zu/9rgGYBnqpNTado1g5:USZtrza09Ke0gYv2Z4ZZQOdUg5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48acb1897addbfa69fcec55513136fdb_JaffaCakes118
Files
-
48acb1897addbfa69fcec55513136fdb_JaffaCakes118.exe windows:4 windows x86 arch:x86
59ecf7d0d43bf8ae7ec2b606d7b5c57f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerLanguageNameA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
netapi32
Netbios
ws2_32
htonl
listen
accept
bind
recvfrom
setsockopt
gethostname
send
select
recv
closesocket
connect
inet_addr
htons
socket
sendto
kernel32
LocalFree
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
GetFileAttributesA
GetFileSize
GetFileTime
SetErrorMode
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GetProcessVersion
MulDiv
GlobalFlags
GetCPInfo
GetOEMCP
WritePrivateProfileStringA
RtlUnwind
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
ExitProcess
CreateThread
ExitThread
RaiseException
LocalAlloc
HeapReAlloc
GetACP
SetStdHandle
GetFileType
GetTimeZoneInformation
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
EnterCriticalSection
lstrcmpA
SetLastError
SetThreadPriority
GetThreadPriority
FreeLibrary
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
GlobalLock
GlobalUnlock
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
CreateEventA
SuspendThread
GetCurrentThreadId
ResumeThread
SetEvent
WaitForSingleObject
lstrcmpiA
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
lstrcpyA
lstrlenA
MultiByteToWideChar
LoadLibraryA
QueryPerformanceCounter
GetProcAddress
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
DuplicateHandle
GetCurrentDirectoryA
Sleep
FindResourceA
LoadResource
LockResource
GetModuleFileNameA
FileTimeToLocalFileTime
FileTimeToSystemTime
SetFileAttributesA
DeleteFileA
RemoveDirectoryA
CreateDirectoryA
MoveFileA
GetLastError
FormatMessageA
GlobalMemoryStatus
GetVersionExA
GetWindowsDirectoryA
OpenProcess
TerminateProcess
CloseHandle
CreateToolhelp32Snapshot
Process32First
Module32First
Process32Next
GetLogicalDriveStringsA
GetDriveTypeA
GetCurrentProcess
GetLocalTime
FindFirstFileA
FindNextFileA
FindClose
GlobalFree
GlobalAlloc
GetCurrentThread
QueryPerformanceFrequency
HeapSize
user32
GetClientRect
AdjustWindowRectEx
SetFocus
GetFocus
GetSysColor
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
PostMessageA
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
IsDialogMessageA
SetWindowTextA
DestroyMenu
PostQuitMessage
SetCursor
LoadCursorA
GetSysColorBrush
LoadStringA
GetClassNameA
PtInRect
ClientToScreen
TabbedTextOutA
DrawTextA
GrayStringA
CopyRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
UnregisterClassA
TrackPopupMenu
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
GetClassLongA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetNextDlgTabItem
EndDialog
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
UnhookWindowsHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetKeyState
CallNextHookEx
IsWindowVisible
PeekMessageA
SetWindowsHookExA
GetSystemMetrics
CharUpperA
EnumWindows
GetPropA
IsWindowEnabled
EnableWindow
GetActiveWindow
SetActiveWindow
GetCursorPos
CreatePopupMenu
AppendMenuA
RegisterHotKey
SetPropA
UnregisterHotKey
ShowWindow
SetForegroundWindow
SendMessageA
LoadIconA
MessageBoxA
ExitWindowsEx
mouse_event
keybd_event
wsprintfA
GetDC
ReleaseDC
ValidateRect
GetMenuItemID
gdi32
DeleteDC
BitBlt
SelectObject
CreateCompatibleBitmap
GetDeviceCaps
CreateCompatibleDC
CreateDCA
GetClipBox
SetTextColor
SetBkColor
CreateBitmap
SaveDC
RestoreDC
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetObjectA
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetStockObject
SelectPalette
RealizePalette
GetDIBits
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
OpenProcessToken
AdjustTokenPrivileges
RegDeleteValueA
RegDeleteKeyA
RegQueryValueExA
RegSetValueExA
RegOpenKeyA
RegCloseKey
LookupPrivilegeValueA
RegCreateKeyA
RegOpenKeyExA
RegEnumValueA
RegEnumKeyA
RegCreateKeyExA
shell32
SHGetFileInfoA
ShellExecuteA
Shell_NotifyIconA
comctl32
ord17
wsock32
WSACleanup
WSAStartup
wininet
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetGetLastResponseInfoA
InternetConnectA
InternetQueryDataAvailable
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetCloseHandle
iphlpapi
GetAdaptersInfo
Sections
.data Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE