Static task
static1
Behavioral task
behavioral1
Sample
61ca79c5b24ee340b35abd3272c3f1f3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
61ca79c5b24ee340b35abd3272c3f1f3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
61ca79c5b24ee340b35abd3272c3f1f3_JaffaCakes118
-
Size
180KB
-
MD5
61ca79c5b24ee340b35abd3272c3f1f3
-
SHA1
00ea0b39399475e2cf7d734acb8ff47f9908a16f
-
SHA256
982cf2ffb45e9fd196268318eb14ad938a2011c4e0780124e10b43223ff6f4c1
-
SHA512
fa51dd6b45bd3e0cc55ceff1e95247cb168455c561991047472939855cd6d69901f716bdb0e934f88bacf0c3ec1bbb34b265737c9a2397930b8da6a20b4504c8
-
SSDEEP
3072:gXaPjiD2hPdjvsv6yRxWKB3VtWHGYf7M3M0ucvIP/SCLlvcqH:gXaPjiihPdypfW4tjSY3MJXzf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 61ca79c5b24ee340b35abd3272c3f1f3_JaffaCakes118
Files
-
61ca79c5b24ee340b35abd3272c3f1f3_JaffaCakes118.exe windows:4 windows x86 arch:x86
847f8cdec8e8a9bb2a9d508216da4906
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetOpenA
InternetOpenUrlA
InternetQueryOptionA
InternetGetConnectedState
InternetCloseHandle
wsock32
gethostname
WSAStartup
gethostbyname
WSACleanup
inet_addr
mfc42
ord6845
ord6856
ord6835
ord4589
ord4588
ord4899
ord6812
ord4370
ord4892
ord6817
ord5076
ord4340
ord4347
ord4720
ord4889
ord4531
ord4545
ord4543
ord4526
ord4529
ord4524
ord4963
ord4960
ord4108
ord6054
ord1776
ord5281
ord3748
ord1725
ord5260
ord6614
ord6691
ord4432
ord6514
ord858
ord6478
ord825
ord4234
ord6199
ord2645
ord6605
ord4710
ord2379
ord2393
ord5807
ord5808
ord3702
ord501
ord773
ord2919
ord389
ord823
ord5651
ord3127
ord3616
ord3663
ord665
ord603
ord1969
ord273
ord1979
ord3318
ord5186
ord350
ord354
ord998
ord6816
ord6815
ord6383
ord2801
ord5583
ord268
ord5607
ord2762
ord5600
ord5356
ord1075
ord5204
ord3229
ord6059
ord1228
ord537
ord1138
ord1105
ord1601
ord535
ord2846
ord5572
ord2915
ord2740
ord5710
ord4278
ord6662
ord2764
ord6385
ord798
ord1997
ord5448
ord5194
ord533
ord690
ord1988
ord5207
ord6407
ord2614
ord6311
ord4171
ord532
ord6283
ord6282
ord861
ord4202
ord3811
ord2818
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord4424
ord5440
ord1567
ord815
ord2723
ord2390
ord3059
ord5100
ord6846
ord6858
ord4303
ord3350
ord5012
ord975
ord5472
ord3403
ord2879
ord2878
ord4151
ord6055
ord4077
ord5237
ord5282
ord2649
ord1665
ord4436
ord3369
ord4427
ord3623
ord366
ord1134
ord674
ord2725
ord2302
ord5252
ord2623
ord1146
ord1168
ord1106
ord2486
ord4129
ord2776
ord6197
ord6378
ord6377
ord6215
ord1083
ord2086
ord6779
ord6663
ord4275
ord1771
ord6366
ord2413
ord2024
ord4219
ord2581
ord4401
ord5290
ord3639
ord567
ord692
ord3797
ord2859
ord2860
ord6597
ord6800
ord3402
ord3721
ord795
ord6880
ord4998
ord6453
ord6808
ord539
ord465
ord466
ord2241
ord1238
ord5981
ord2864
ord6805
ord6699
ord3237
ord1948
ord5303
ord4699
ord5715
ord817
ord565
ord2726
ord4226
ord2803
ord939
ord922
ord924
ord926
ord2841
ord5450
ord6394
ord2107
ord941
ord1799
ord614
ord1206
ord290
ord1223
ord4003
ord1113
ord1114
ord5575
ord2140
ord434
ord6153
ord6928
ord6930
ord668
ord2781
ord2770
ord356
ord353
ord1833
ord2917
ord958
ord6312
ord4177
ord5442
ord6010
ord5773
ord2601
ord3180
ord3183
ord3176
ord3507
ord3701
ord500
ord772
ord5860
ord6142
ord1832
ord3126
ord349
ord550
ord5645
ord4853
ord4376
ord5265
ord6847
ord6867
ord6859
ord6832
ord6855
ord6823
ord6857
ord6591
ord6650
ord324
ord540
ord860
ord641
ord800
ord3597
ord4425
ord4627
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord2514
ord5103
ord4467
ord3738
ord561
ord6241
ord1576
msvcrt
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_initterm
_controlfp
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
calloc
_mbscoll
_mbsicoll
memcmp
_getcwd
_mbscmp
_splitpath
strncmp
isalpha
tolower
_mbscspn
_mbsspn
isalnum
_mbsnbcmp
_mbsstr
_mbschr
_purecall
memmove
malloc
isdigit
free
realloc
_stricmp
toupper
wcslen
wcscmp
localtime
strftime
wcscpy
strchr
_chdir
strncpy
_ftol
strcmp
exit
_mbsicmp
sscanf
memcpy
remove
rename
_access
strcpy
strcat
atol
atoi
_itoa
_mbsnbcpy
time
srand
rand
strlen
__getmainargs
memset
sprintf
_EH_prolog
__CxxFrameHandler
_stat
_setmbcp
_CxxThrowException
kernel32
MultiByteToWideChar
CreateMutexA
CreateEventA
CloseHandle
GetSystemTime
GetExitCodeThread
WaitForSingleObject
SetThreadPriority
CreateThread
GetLastError
ReleaseMutex
ResetEvent
InterlockedIncrement
WriteFile
CreateProcessA
CreateFileA
GetTempFileNameA
GetTempPathA
DeleteFileA
LocalFree
FormatMessageA
GetEnvironmentVariableA
InterlockedDecrement
Sleep
SetPriorityClass
GetCurrentProcess
ReleaseSemaphore
OpenSemaphoreA
WaitForMultipleObjects
lstrlenA
GetModuleFileNameA
GetCurrentThreadId
WideCharToMultiByte
CreatePipe
ReadFile
GetCurrentProcessId
OpenMutexA
OpenProcess
DuplicateHandle
GetVersionExA
lstrcpyA
GetProcAddress
GetModuleHandleA
TerminateProcess
FreeLibrary
LoadLibraryA
GlobalMemoryStatus
SetFileAttributesA
CreateDirectoryA
GetDriveTypeA
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
SetVolumeLabelA
GetDiskFreeSpaceA
GetStartupInfoA
ExitThread
SetEvent
user32
GetFocus
PostMessageA
EnumWindows
GetWindowTextA
wvsprintfA
SetTimer
LoadIconA
PostQuitMessage
GetSystemMetrics
EnableWindow
GetDC
GetClientRect
GetTabbedTextExtentA
ReleaseDC
ShowOwnedPopups
IsCharAlphaA
SendMessageA
IsWindow
PostThreadMessageA
SetWindowPos
SendNotifyMessageA
KillTimer
OemToCharBuffA
CharToOemBuffA
GetWindowThreadProcessId
GetWindowRect
gdi32
GetTextExtentPoint32A
advapi32
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
ole32
CoCreateGuid
StringFromCLSID
CoCreateInstance
OleRun
CoInitialize
oleaut32
VariantClear
VariantInit
GetErrorInfo
SysFreeString
SysStringLen
SysAllocString
VariantChangeType
SysAllocStringByteLen
SysStringByteLen
VariantCopy
GetActiveObject
Sections
.text Size: 116KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ