Static task
static1
Behavioral task
behavioral1
Sample
7099dfa9c27385bc2c32868edc82ad59_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7099dfa9c27385bc2c32868edc82ad59_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
7099dfa9c27385bc2c32868edc82ad59_JaffaCakes118
-
Size
84KB
-
MD5
7099dfa9c27385bc2c32868edc82ad59
-
SHA1
842a729f8b27de5ab909c032320fcaa9c73dd1a3
-
SHA256
465ae1281d35a79d2f395e2a807eae58cb68b1e4414be4ad107b3576be06eaab
-
SHA512
4e2a3929accc2e17a8473bf75848d6c73fc7dc0ba3afa3c9e071f690eb10b6b8ee8e73d9205adba96a9d61416d3dc7a5ebf19125b338ee021cc0547c5bf886a4
-
SSDEEP
1536:AT7Tqc/vcroFViuseqSpJ5V5c1Cor/zfWjuuZ+3GKQ0y8OFoLcXSi+ZuDt:ADqc3croFVtqSpXc1Cor/z4uonEOFmkt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7099dfa9c27385bc2c32868edc82ad59_JaffaCakes118
Files
-
7099dfa9c27385bc2c32868edc82ad59_JaffaCakes118.exe windows:4 windows x86 arch:x86
033c04a670624ec42a40a19c567ee474
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetSysColor
GetDoubleClickTime
LoadImageA
GetSysColorBrush
GetMonitorInfoA
GetKeyboardType
advapi32
LookupAccountSidA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegEnumValueA
RegCloseKey
OpenProcessToken
RegGetKeySecurity
RegOpenKeyExA
GetTokenInformation
psapi
GetModuleInformation
ws2_32
htonl
WSAStartup
wininet
InternetReadFile
HttpQueryInfoA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
netapi32
NetUserGetInfo
NetApiBufferFree
kernel32
GetStringTypeW
FlushFileBuffers
GetLocaleInfoA
VirtualProtect
GetSystemInfo
MultiByteToWideChar
GetStringTypeA
LCMapStringW
LCMapStringA
SetStdHandle
GetCPInfo
GetOEMCP
GetACP
VirtualAlloc
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
SetUnhandledExceptionFilter
VirtualQuery
InterlockedExchange
OpenProcess
GetFirmwareEnvironmentVariableA
GetVolumeInformationA
GetFileTime
CreateDirectoryA
GetSystemDirectoryA
SetErrorMode
GetProcessPriorityBoost
GetVersion
GetStdHandle
GetCurrentProcess
GetFileType
GetCommandLineA
CloseHandle
Sleep
GetTickCount
WriteFile
CreateFileA
ExitProcess
CreateMutexA
OpenMutexA
CreateProcessA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
SetEnvironmentVariableA
CopyFileA
SetFileAttributesA
GetLastError
CreateThread
GetLocalTime
GetDriveTypeA
GetLogicalDriveStringsA
GetSystemTimeAsFileTime
GetProcAddress
GetModuleHandleA
TerminateProcess
RtlUnwind
GetStartupInfoA
GetVersionExA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
HeapFree
HeapAlloc
HeapReAlloc
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
HeapDestroy
HeapCreate
VirtualFree
SetFilePointer
LoadLibraryA
Sections
.text Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE