Static task
static1
Behavioral task
behavioral1
Sample
4b0f5cac931b7f58d97155d5222a8128_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4b0f5cac931b7f58d97155d5222a8128_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4b0f5cac931b7f58d97155d5222a8128_JaffaCakes118
-
Size
76KB
-
MD5
4b0f5cac931b7f58d97155d5222a8128
-
SHA1
0165a027d8f5b379eb4c939c534ca5c7e940596e
-
SHA256
8693c140a9d02f24ac1bcabf9a8e30b9202c89839ead17a99228b861df2d2ea1
-
SHA512
17ecddb3d101c1ad05c0637d32a957fe1f12214e5370fe6b94e4e4e4414df41dfceeec3de18fc239868ec986a3328c4e9aae1feb3786e8ae6f3fac7e71a3ee8e
-
SSDEEP
768:dz1DQwybHqK+LCJAaYBFcgdAjUoJPOjCcEKn73RSCqdqvDcl4tVatziRhWomwRZT:dz1Dg+5ygdAjUoJPMj73RTqYvdqoILY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b0f5cac931b7f58d97155d5222a8128_JaffaCakes118
Files
-
4b0f5cac931b7f58d97155d5222a8128_JaffaCakes118.exe windows:4 windows x86 arch:x86
bce8a23d9eaede1cf411a021b8245509
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
SHGetFileInfoA
SHGetSpecialFolderPathW
wininet
InternetQueryOptionW
HttpQueryInfoW
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetQueryDataAvailable
InternetOpenUrlA
InternetGetConnectedState
shlwapi
PathAppendA
PathFindExtensionA
PathAppendW
ntdll
strrchr
wcsstr
_wcsnicmp
atoi
_memicmp
sscanf
_chkstk
_vsnprintf
strstr
_snprintf
wcsrchr
_snwprintf
strchr
_strnicmp
isxdigit
wcscmp
wcslen
memmove
strncmp
vsprintf
strncpy
sprintf
ws2_32
inet_addr
closesocket
connect
ioctlsocket
socket
htons
sendto
send
WSAStartup
inet_ntoa
getpeername
ntohs
setsockopt
select
recv
WSACleanup
gethostbyname
msvcrt
??2@YAPAXI@Z
malloc
calloc
realloc
free
strtok
srand
rand
??3@YAXPAX@Z
kernel32
HeapReAlloc
GetVolumeInformationW
Sleep
lstrcatW
CreateRemoteThread
VirtualFreeEx
VirtualProtect
OpenProcess
VirtualAllocEx
WriteProcessMemory
ReadProcessMemory
InterlockedIncrement
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
CreateMutexA
OpenFileMappingA
ReleaseMutex
GetWindowsDirectoryA
OpenMutexW
GetModuleFileNameA
CreateDirectoryA
GetFileSize
LockFile
DeviceIoControl
SetCurrentDirectoryA
FindFirstFileA
FindNextFileA
FindClose
DeleteFileW
GetTempFileNameW
FlushFileBuffers
DisconnectNamedPipe
CreateNamedPipeA
ConnectNamedPipe
CreateMutexW
WaitForSingleObject
InitializeCriticalSection
ReadFile
CreateThread
GetVersionExA
GetLocaleInfoA
GetModuleFileNameW
CopyFileW
GetProcessHeap
lstrcatA
GetFileTime
FileTimeToSystemTime
GetSystemTime
EnterCriticalSection
CreateFileA
LeaveCriticalSection
CreateProcessW
lstrcpyA
MoveFileExA
lstrcmpA
WideCharToMultiByte
MoveFileExW
lstrcmpW
ExitThread
DeleteFileA
SetFileAttributesA
lstrlenA
GetFileAttributesA
SetFileAttributesW
GetFileAttributesW
HeapFree
HeapAlloc
MultiByteToWideChar
lstrcpyW
ExitProcess
GetTickCount
lstrcpynA
GetWindowsDirectoryW
GetCurrentThreadId
GetLastError
CloseHandle
WriteFile
CreateFileW
lstrcpynW
user32
GetMessageA
RegisterClassExA
TranslateMessage
DispatchMessageA
DefWindowProcA
CreateWindowExA
RegisterDeviceNotificationA
wvsprintfA
advapi32
RegCloseKey
LookupPrivilegeValueA
OpenProcessToken
CryptGetHashParam
RegCreateKeyExW
RegSetValueExW
AdjustTokenPrivileges
CryptAcquireContextA
CryptCreateHash
CryptReleaseContext
CryptHashData
CryptDestroyHash
ole32
CoInitialize
CoCreateInstance
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ