Static task
static1
Behavioral task
behavioral1
Sample
5c053ad1678f1dbd5563e5ad6e7e211b_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
5c053ad1678f1dbd5563e5ad6e7e211b_JaffaCakes118
-
Size
2.4MB
-
MD5
5c053ad1678f1dbd5563e5ad6e7e211b
-
SHA1
81451ae6d59a7a7b696b550dbac113ec2d8850f4
-
SHA256
d2926e45792a14b40e8ef2b2b5f8810f6b2a9e6a434f3dc4fccfb066e9fa2d87
-
SHA512
4e30d5bad33d4dcbe6a67ac7f98563a488c590cc63d9920b5ca74a546068a95b0af91f6a8f3b6f9fc75cf399132c15ab7c9d1f190da98b99ac7de9c1b96954ba
-
SSDEEP
1536:8rnMProjCWRWG2TC1uP0Z6ncFIfp1nBiEcEmO:8rnkrp5G2T1Q6ncFIHnBiE7V
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5c053ad1678f1dbd5563e5ad6e7e211b_JaffaCakes118
Files
-
5c053ad1678f1dbd5563e5ad6e7e211b_JaffaCakes118.exe windows:4 windows x86 arch:x86
3b4066ad1a92635fb70dcfb6cbc7df24
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileAttributesA
lstrlenA
GetProcAddress
lstrcmpiA
GetModuleHandleA
CreateProcessA
WaitForSingleObject
ExitProcess
WinExec
ReleaseMutex
ExpandEnvironmentStringsA
GetModuleFileNameA
CloseHandle
GetLastError
CreateMutexA
ExitThread
GetLocalTime
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetFileTime
CreateFileA
GetLocaleInfoA
GetVersionExA
GetFileAttributesA
DeleteFileA
ReadFile
GetFileSize
GetWindowsDirectoryA
GlobalFree
GlobalAlloc
MultiByteToWideChar
GlobalUnlock
GlobalLock
InterlockedDecrement
WideCharToMultiByte
FreeLibrary
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetStartupInfoA
LocalFree
CreateThread
TerminateThread
GetTickCount
Sleep
WriteFile
LoadLibraryA
user32
GetDesktopWindow
RegisterWindowMessageA
SendMessageTimeoutA
EnableWindow
GetAsyncKeyState
GetCursorPos
mouse_event
SetFocus
VkKeyScanA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
wsprintfA
FindWindowA
BlockInput
SetForegroundWindow
GetForegroundWindow
keybd_event
GetWindowRect
ShowWindow
SendMessageA
FindWindowExA
advapi32
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHGetFolderPathA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
VariantClear
SysFreeString
VariantInit
SysAllocString
psapi
GetModuleFileNameExA
msvcrt
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
_CxxThrowException
wcslen
__CxxFrameHandler
malloc
strcat
rand
memcpy
??2@YAPAXI@Z
_vsnprintf
__p__fmode
__set_app_type
_except_handler3
??1type_info@@UAE@XZ
_controlfp
__p__commode
strcmp
strtok
srand
strncpy
atoi
_snprintf
tolower
strchr
strcpy
strlen
sprintf
strstr
memset
free
wininet
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
HttpAddRequestHeadersA
HttpSendRequestA
ws2_32
gethostbyname
inet_ntoa
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE