Static task
static1
Behavioral task
behavioral1
Sample
72ac194161a0994e4a93a04d88014a62_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
72ac194161a0994e4a93a04d88014a62_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
72ac194161a0994e4a93a04d88014a62_JaffaCakes118
-
Size
44KB
-
MD5
72ac194161a0994e4a93a04d88014a62
-
SHA1
863a1256696740f37088952039b470eb45dfa342
-
SHA256
add22817a9e36e6449e4a266a5abb1582e68a1507d7b3a684e87d22dbe76a74e
-
SHA512
30afd007c3b0d5d91ef3842d386670c3adf0db69e20a4a75f9976c681a293eaa140013f86951c6feaeaee3605bff3f073f2df43e4a4ed03fc1cefa29066fb099
-
SSDEEP
768:9xE7AJeG5fKFJZ/M0gy0UGc1xkUXH8hNdf5Ihv3AAflZh9QGv7rdsae9VOHiKJ:9uweG5fKFJ5MmbkUX6NdhIh/AAflZhqs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 72ac194161a0994e4a93a04d88014a62_JaffaCakes118
Files
-
72ac194161a0994e4a93a04d88014a62_JaffaCakes118.exe windows:4 windows x86 arch:x86
85c8197ce098e5da19bf641becd8f6ce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
mfc42
ord5861
ord860
ord825
ord823
ord800
ord540
ord537
ord535
ord6930
ord2818
ord1247
ord1105
ord6283
ord6282
ord6877
ord4202
ord858
ord926
ord1575
ord941
ord354
ord801
ord6883
ord3790
ord665
ord940
ord5683
ord4277
ord6143
ord541
ord4129
ord6928
msvcrt
free
malloc
memcpy
sprintf
_splitpath
memset
strcpy
strncpy
realloc
memcmp
??0exception@@QAE@ABV0@@Z
strlen
_CxxThrowException
strcmp
_strupr
atol
_mbslwr
__dllonexit
_onexit
??1type_info@@UAE@XZ
_except_handler3
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_stricmp
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__CxxFrameHandler
_controlfp
kernel32
GetStartupInfoA
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
WritePrivateProfileStringA
MoveFileExA
GetTickCount
WinExec
DeleteFileA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetWindowsDirectoryA
CreateDirectoryA
OpenProcess
lstrcpyA
LoadLibraryA
GetProcAddress
InitializeCriticalSection
IsDBCSLeadByte
lstrcpynA
LoadLibraryExA
FindResourceA
GetLastError
CloseHandle
GetCurrentProcess
GetCurrentThread
GetModuleFileNameA
SetLastError
Sleep
GetCurrentThreadId
lstrcmpiA
GetCommandLineA
lstrlenA
lstrlenW
MultiByteToWideChar
GetShortPathNameA
GetModuleHandleA
WideCharToMultiByte
FreeLibrary
SizeofResource
LoadResource
lstrcatA
user32
PostThreadMessageA
GetMessageA
CharNextA
LoadStringA
KillTimer
SetTimer
TranslateMessage
DispatchMessageA
advapi32
RegEnumKeyExA
RegCreateKeyExA
RegOpenKeyExA
StartServiceCtrlDispatcherA
RegDeleteValueA
RegSetValueExA
RegCloseKey
RegQueryValueExA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegDeleteKeyA
OpenServiceA
ControlService
QueryServiceStatus
DeleteService
OpenSCManagerA
CreateServiceA
ChangeServiceConfig2A
CloseServiceHandle
GetAclInformation
AddAce
InitializeAcl
GetAce
AddAccessAllowedAce
LookupAccountNameA
GetTokenInformation
OpenThreadToken
OpenProcessToken
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
GetLengthSid
CopySid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegQueryInfoKeyA
RegEnumValueA
CreateProcessAsUserA
ole32
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
CoInitializeEx
CoUninitialize
CoInitializeSecurity
CoRegisterClassObject
CoRevokeClassObject
CoCreateInstance
CoInitialize
oleaut32
VarUI4FromStr
SysAllocString
LoadTypeLi
RegisterTypeLi
SysFreeString
msvcp60
??0out_of_range@std@@QAE@ABV01@@Z
??1out_of_range@std@@UAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??_7out_of_range@std@@6B@
??0logic_error@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??0logic_error@std@@QAE@ABV01@@Z
Sections
.text Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ