Static task
static1
Behavioral task
behavioral1
Sample
7250321ce8becdda5103495d9dbd4f5e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7250321ce8becdda5103495d9dbd4f5e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7250321ce8becdda5103495d9dbd4f5e_JaffaCakes118
-
Size
628KB
-
MD5
7250321ce8becdda5103495d9dbd4f5e
-
SHA1
1dabf51b3e422a324077664a817a7088b9dfca3b
-
SHA256
bfedb9876211f6aff61f3d1d0c5f394ef57afff4568095537a9f761130cb30fe
-
SHA512
db5fe0f4a425f318782401dfe124ae3291062e505cd92cef652fb3c72d47277a942514aaee822d4e2521b937715330541d52d7b185b151cc6820d04c5248b8df
-
SSDEEP
12288:3CRO0sBcLEUCRO0sBcLE0CRO0sBcLEUCRO0sBcLE:yRBSRBoRBSRB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7250321ce8becdda5103495d9dbd4f5e_JaffaCakes118
Files
-
7250321ce8becdda5103495d9dbd4f5e_JaffaCakes118.exe windows:4 windows x86 arch:x86
7f2dcbc2321709700da018941988dcba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
GetPixel
SelectObject
kernel32
AddAtomA
CloseHandle
CreateFileA
CreateMailslotA
CreateProcessA
CreateSemaphoreA
CreateThread
CreateToolhelp32Snapshot
ExitProcess
FindAtomA
GetAtomNameA
GetCommandLineA
GetComputerNameA
GetDriveTypeA
GetFileTime
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetStartupInfoA
GetSystemTime
GetTickCount
GetVersionExA
GlobalLock
GlobalMemoryStatus
GlobalUnlock
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
OpenFile
OpenProcess
Process32First
Process32Next
ReadFile
ReleaseSemaphore
SetCurrentDirectoryA
SetFileAttributesA
SetFileTime
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WriteFile
msvcrt
_mkdir
__getmainargs
__p___argc
__p___argv
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_findclose
_findfirst
_findnext
_iob
_onexit
_setmode
_splitpath
abort
atexit
atof
atoi
exit
fclose
fflush
fgetc
fopen
fprintf
fputc
fread
free
fscanf
fseek
ftell
fwrite
getenv
malloc
memmove
memset
rand
realloc
remove
signal
sprintf
srand
sscanf
strcat
strcmp
strcpy
strlen
strstr
time
shell32
ShellExecuteA
shlwapi
PathFileExistsA
user32
CallNextHookEx
CloseClipboard
DispatchMessageA
GetClipboardData
GetDC
GetDesktopWindow
GetKeyState
GetMessageA
GetWindowRect
MessageBoxA
OpenClipboard
ReleaseDC
SetWindowsHookExA
TranslateMessage
UnhookWindowsHookEx
wininet
HttpOpenRequestA
HttpSendRequestA
InternetCloseHandle
InternetConnectA
InternetGetConnectedState
InternetOpenA
InternetReadFile
winmm
mciSendCommandA
mciSendStringA
wsock32
WSACleanup
WSAStartup
accept
bind
closesocket
connect
gethostbyaddr
gethostbyname
htons
listen
recv
send
socket
Sections
.text Size: 137KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 416B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE