Static task
static1
Behavioral task
behavioral1
Sample
622a6ee7a299c38fc273cd255acc54f4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
622a6ee7a299c38fc273cd255acc54f4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
622a6ee7a299c38fc273cd255acc54f4_JaffaCakes118
-
Size
4.5MB
-
MD5
622a6ee7a299c38fc273cd255acc54f4
-
SHA1
714a554823be15e44e46508610698634708f73cf
-
SHA256
c8ecc94bdf3929838e6345ff5328334cdf9fd45a461ab3524a20978f08b1b0f1
-
SHA512
6216c9729e161aa86fbeb4da0c8d3090823bb6431794c910e55494b020c19629f4e513c53a8f776b3fed90d6f78af579f2d563826904df1aee0c140758fb1106
-
SSDEEP
98304:rKzygP8oXtJav0NRZKOzgFEdQJugCtQUH:rKz38oXtJav0NRZKOqZJLCOUH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 622a6ee7a299c38fc273cd255acc54f4_JaffaCakes118
Files
-
622a6ee7a299c38fc273cd255acc54f4_JaffaCakes118.exe windows:4 windows x86 arch:x86
efffd564e172644da0d5be8a0922c1d0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddAtomA
CloseHandle
CreateEventA
CreateSemaphoreA
CreateToolhelp32Snapshot
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FileTimeToSystemTime
FindAtomA
FormatMessageA
FreeLibrary
GetAtomNameA
GetCurrentProcess
GetCurrentProcessId
GetLastError
GetModuleFileNameA
GetProcAddress
GetProcessTimes
GlobalMemoryStatus
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
LeaveCriticalSection
LoadLibraryA
LocalFree
Process32First
Process32Next
ReleaseSemaphore
SetEvent
SetLastError
SetPriorityClass
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualQuery
WaitForSingleObject
msvcrt
_fdopen
_itoa
_read
_strdup
_write
_HUGE
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_assert
_atoi64
_beginthread
_cexit
_ctype
_errno
_filbuf
_filelengthi64
_fstati64
_ftime
_iob
_isctype
_lseeki64
_onexit
_pclose
_pctype
_popen
_setjmp
_setmode
_stricmp
_strnicmp
_vsnprintf
abort
acos
asin
atan
atan2
atexit
atof
atoi
ceil
clearerr
clock
cos
cosh
ctime
difftime
exit
exp
fclose
fflush
fgetc
fgetpos
fgets
floor
fmod
fopen
fprintf
fputc
fputs
fread
free
frexp
fscanf
fseek
fsetpos
ftell
fwrite
getc
getenv
gmtime
ispunct
isspace
ldexp
localeconv
localtime
log
log10
longjmp
malloc
memchr
memcmp
memcpy
memmove
memset
mktime
modf
pow
printf
putc
rand
realloc
remove
rename
setlocale
setvbuf
signal
sin
sinh
sprintf
sqrt
srand
strcat
strchr
strcmp
strcoll
strcpy
strcspn
strerror
strftime
strlen
strncat
strncpy
strpbrk
strrchr
strstr
strtod
strtol
strtoul
strxfrm
system
tan
tanh
time
tmpfile
tmpnam
tolower
toupper
ungetc
user32
MessageBoxA
wsock32
WSACleanup
WSAGetLastError
WSAStartup
accept
bind
closesocket
gethostbyname
gethostname
getpeername
htonl
htons
inet_addr
ioctlsocket
listen
recv
select
send
socket
libxml2
xmlAddChild
xmlDocDumpMemory
xmlDocGetRootElement
xmlDocSetRootElement
xmlFree
xmlFreeDoc
xmlGetProp
xmlMutexLock
xmlMutexUnlock
xmlNewChild
xmlNewDoc
xmlNewDocNode
xmlNewMutex
xmlNewNode
xmlNewProp
xmlNewTextChild
xmlParseFile
xmlSaveFile
xmlSaveFormatFileEnc
xmlSetProp
xmlStrEqual
xmlStrcmp
xmlSubstituteEntitiesDefault
Sections
.text Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 25KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.stab Size: 121KB - Virtual size: 121KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.stabstr Size: 18KB - Virtual size: 17KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ