Static task
static1
Behavioral task
behavioral1
Sample
615cdabec8f2ebb95b6450ed88ec0ffc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
615cdabec8f2ebb95b6450ed88ec0ffc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
615cdabec8f2ebb95b6450ed88ec0ffc_JaffaCakes118
-
Size
720KB
-
MD5
615cdabec8f2ebb95b6450ed88ec0ffc
-
SHA1
43bbf61dc6037336f124007b99e5f877d8d57f04
-
SHA256
2bf243f75bb79db52a910b3d8139552a583ea9a33b77d94cd4d6733bc7b34495
-
SHA512
9318578e0024c4ab50be07e51d01b3c1279e12e0bdd5921b10345d1101a18327eb83fb2869d469654daba94c9287b2598a97b9c02ecbd0294b47064cbceb7325
-
SSDEEP
12288:x1lPMmHBwOoWwGnBwL9XLF/m6JAnC0TWmChtPkPbci5NAx8edwFOXsh5Hm3L:zlPMCwOoTGnBwL9XLFu88nChtPkT348g
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 615cdabec8f2ebb95b6450ed88ec0ffc_JaffaCakes118
Files
-
615cdabec8f2ebb95b6450ed88ec0ffc_JaffaCakes118.exe windows:4 windows x86 arch:x86
78ba54e413379af33ca3a910465d531a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSACleanup
WSACloseEvent
WSAEventSelect
WSACreateEvent
mfc42
ord924
ord2642
ord3089
ord926
ord4277
ord2818
ord4129
ord2763
ord941
ord538
ord5683
ord4202
ord6877
ord2764
ord2302
ord4224
ord5710
ord1907
ord5161
ord5162
ord5160
ord4905
ord4742
ord4976
ord4948
ord4358
ord4377
ord4854
ord5287
ord4835
ord768
ord489
ord2358
ord4258
ord6880
ord3092
ord3721
ord795
ord1146
ord1168
ord1138
ord1105
ord940
ord6779
ord6648
ord939
ord3790
ord3698
ord765
ord2820
ord692
ord1771
ord6366
ord2413
ord2024
ord4219
ord2581
ord4401
ord3639
ord3803
ord922
ord2582
ord4402
ord3640
ord693
ord4243
ord4284
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord561
ord815
ord2528
ord1200
ord2725
ord1908
ord1690
ord4439
ord2054
ord4431
ord771
ord1008
ord496
ord1640
ord818
ord2463
ord1651
ord6197
ord2380
ord1188
ord2882
ord2863
ord4715
ord5850
ord2646
ord2881
ord3742
ord5572
ord2915
ord5288
ord5821
ord3662
ord414
ord713
ord6141
ord282
ord472
ord2393
ord5859
ord3631
ord2411
ord2023
ord4218
ord2578
ord4398
ord3582
ord683
ord616
ord2294
ord2362
ord3499
ord3619
ord3873
ord3370
ord2363
ord6241
ord3996
ord6905
ord6907
ord2817
ord3998
ord2645
ord2862
ord2096
ord384
ord3301
ord3302
ord2301
ord2152
ord1233
ord4220
ord2584
ord3654
ord2438
ord6270
ord1644
ord2827
ord2824
ord3584
ord543
ord803
ord5440
ord6383
ord5450
ord6394
ord665
ord1979
ord6010
ord353
ord551
ord3811
ord2614
ord668
ord2770
ord356
ord4278
ord4160
ord2777
ord802
ord5601
ord542
ord1228
ord1085
ord3702
ord5600
ord501
ord773
ord1083
ord5607
ord2762
ord2776
ord3994
ord3337
ord6569
ord6874
ord1086
ord5856
ord5621
ord6662
ord5785
ord289
ord613
ord4299
ord4297
ord1641
ord5788
ord4133
ord3693
ord323
ord5789
ord5875
ord6172
ord2414
ord640
ord3626
ord3571
ord3663
ord355
ord2515
ord3452
ord823
ord1175
ord2078
ord537
ord535
ord3797
ord6442
ord2860
ord6215
ord6358
ord6453
ord6605
ord2754
ord2567
ord2864
ord2379
ord5981
ord470
ord755
ord6199
ord2122
ord1088
ord3874
ord4275
ord567
ord556
ord609
ord656
ord809
ord3574
ord4424
ord3402
ord5290
ord4396
ord1776
ord6055
ord2575
ord3610
ord4710
ord5953
ord858
ord6334
ord4234
ord2370
ord825
ord324
ord540
ord860
ord641
ord800
ord3597
ord4425
ord4627
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord2514
ord4998
ord4853
ord4376
ord5265
ord4259
ord1576
msvcrt
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_except_handler3
_onexit
__dllonexit
strtol
_stricmp
_errno
strerror
isalpha
strcspn
__p___argc
printf
strncpy
strrchr
calloc
_itoa
memmove
fflush
fseek
ftell
fread
realloc
isxdigit
tolower
_close
_setmbcp
abort
_CxxThrowException
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
??0exception@@QAE@ABV0@@Z
memchr
_ultoa
_strcmpi
_write
_open
time
clock
srand
rand
_ftol
malloc
__p___argv
sscanf
_purecall
atoi
fopen
fclose
sprintf
_mkdir
strchr
strncmp
free
fwrite
strstr
getenv
_access
_mbscmp
_strnicmp
_mbsicmp
_strdup
__CxxFrameHandler
_controlfp
kernel32
GlobalAlloc
GlobalLock
GlobalUnlock
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetSystemDefaultLCID
Sleep
GetWindowsDirectoryA
MultiByteToWideChar
CreateFileA
GetModuleFileNameA
GetModuleHandleA
CopyFileA
GetDriveTypeA
GetCurrentProcess
WritePrivateProfileStringA
GetPrivateProfileIntA
GetPrivateProfileStringA
SetThreadLocale
SizeofResource
WritePrivateProfileSectionA
GlobalFree
HeapFree
HeapAlloc
GetProcessHeap
GetComputerNameA
GetCurrentThreadId
GetTickCount
GlobalMemoryStatus
GetFileTime
GetDiskFreeSpaceExA
GetSystemDirectoryA
ResetEvent
GetStartupInfoA
LockResource
LoadResource
WriteFile
GetEnvironmentVariableA
ReadFile
GetCurrentThread
GetThreadTimes
GetProcessTimes
GetSystemTime
GetSystemTimeAdjustment
FindResourceA
DeleteFileA
SetUnhandledExceptionFilter
GetLastError
CreateEventA
MapViewOfFile
CreateFileMappingA
CloseHandle
FindClose
FindNextFileA
FindFirstFileA
WaitForSingleObject
CreateProcessA
GetTempPathA
FreeLibrary
LoadLibraryA
LocalFree
LocalAlloc
GetVersion
DeleteCriticalSection
GetVersionExA
Process32Next
Process32First
CreateToolhelp32Snapshot
IsDebuggerPresent
GetProcAddress
GetVolumeInformationA
MoveFileExA
GetSystemDefaultLangID
GetShortPathNameA
user32
IsMenu
CheckMenuItem
LoadMenuA
GetSubMenu
SetMenuDefaultItem
SetForegroundWindow
GetMenuItemID
SetCursor
FillRect
ModifyMenuA
DefWindowProcA
LoadCursorA
RegisterClassA
UnregisterHotKey
GetSystemMenu
InsertMenuA
SetWindowLongA
RegisterHotKey
SetRect
MapDialogRect
FindWindowA
PostQuitMessage
GetDesktopWindow
LoadStringA
GetDC
InvalidateRect
RegisterWindowMessageA
OpenClipboard
EmptyClipboard
SetClipboardData
SetWindowTextA
EnableWindow
GetForegroundWindow
GetClipboardOwner
GetQueueStatus
RedrawWindow
IsWindow
SetTimer
OffsetRect
GetSysColor
SendMessageA
KillTimer
GetParent
SetCapture
PtInRect
ReleaseCapture
GetCapture
InflateRect
GetFocus
GetCursorPos
IsRectEmpty
GetClientRect
CloseClipboard
PostMessageA
GetWindowRect
LoadIconA
GetWindowTextA
FindWindowExA
UpdateWindow
gdi32
SelectObject
GetStockObject
SetEnhMetaFileBits
DeleteEnhMetaFile
CreateFontIndirectA
CreateCompatibleBitmap
GetTextExtentPoint32A
SetPixel
CreatePen
GetPixel
CreateCompatibleDC
GetCurrentObject
BitBlt
GetObjectA
advapi32
RegOpenKeyExA
GetUserNameA
RegQueryInfoKeyA
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
shell32
DragQueryFileA
DragFinish
Shell_NotifyIconA
SHGetFileInfoA
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
ExtractIconA
comctl32
ImageList_ReplaceIcon
ImageList_SetImageCount
ole32
CoCreateInstance
CoInitialize
CoUninitialize
wsock32
inet_ntoa
ioctlsocket
closesocket
accept
getsockopt
__WSAFDIsSet
listen
sendto
htonl
ntohs
WSAStartup
gethostname
inet_addr
setsockopt
send
recvfrom
select
socket
connect
WSAGetLastError
bind
gethostbyname
htons
recv
iphlpapi
GetNetworkParams
GetAdaptersInfo
wininet
InternetGetConnectedStateEx
InternetCloseHandle
HttpQueryInfoA
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetConnectA
InternetReadFile
InternetOpenA
InternetErrorDlg
InternetQueryOptionA
InternetSetOptionA
InternetSetCookieA
Sections
.text Size: 360KB - Virtual size: 357KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 220KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ