Static task
static1
Behavioral task
behavioral1
Sample
72f23bae11964706123dc944bb7aa1fc_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
72f23bae11964706123dc944bb7aa1fc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
72f23bae11964706123dc944bb7aa1fc_JaffaCakes118
-
Size
40KB
-
MD5
72f23bae11964706123dc944bb7aa1fc
-
SHA1
db22c2ebb9aecaf604c48e496c169f49ef811acf
-
SHA256
1902d229a6518f723f80068ad765e7b26ec2001c6c308ed85e7ab2a663361310
-
SHA512
9b8b35ba2dbebdd85caeb32c2111afff20b620a293a5a9336fa47b46913de432ae3f5600254efde6740783009e990cf981c48c8ef611511258d0a6528174a96a
-
SSDEEP
768:WYC0yHdbD1vjd+3GZ/M8MG/jUtOkFG4oie7H1:g0Q5jd+3G5MZeJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 72f23bae11964706123dc944bb7aa1fc_JaffaCakes118
Files
-
72f23bae11964706123dc944bb7aa1fc_JaffaCakes118.exe windows:4 windows x86 arch:x86
6c4f2cda88ae5749f37b8eef9bd3a498
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
mfc42
ord1105
ord535
ord6930
ord537
ord941
ord858
ord4129
ord5683
ord6928
ord4277
ord801
ord6883
ord6143
ord541
ord940
ord6283
ord6282
ord540
ord2818
ord354
ord823
ord825
ord665
ord3790
ord860
ord5861
ord1247
ord2820
ord3811
ord837
ord1575
ord4202
ord6877
ord800
ord5216
ord3810
ord920
msvcrt
memset
__CxxFrameHandler
strcpy
atol
strcmp
sprintf
_splitpath
_ftol
memcpy
free
_stricmp
malloc
realloc
memcmp
_except_handler3
__dllonexit
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
_onexit
_acmdln
exit
_XcptFilter
_exit
__getmainargs
kernel32
GetStartupInfoA
lstrcatA
lstrcpyA
InitializeCriticalSection
IsDBCSLeadByte
lstrcpynA
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
WideCharToMultiByte
GetModuleHandleA
GetShortPathNameA
MultiByteToWideChar
lstrlenW
GetCommandLineA
lstrcmpiA
WaitForSingleObject
lstrlenA
SetLastError
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetLastError
MoveFileExA
DeleteFileA
GetCurrentThreadId
GetTickCount
WinExec
CreateProcessA
CreateToolhelp32Snapshot
Process32Next
CloseHandle
Sleep
GetModuleFileNameA
GetSystemDirectoryA
GetTempPathA
Process32First
user32
TranslateMessage
GetMessageA
KillTimer
PostThreadMessageA
SetTimer
CharNextA
LoadStringA
DispatchMessageA
advapi32
RegDeleteKeyA
RegEnumValueA
RegQueryInfoKeyA
RegEnumKeyExA
OpenServiceA
ControlService
QueryServiceStatus
DeleteService
OpenSCManagerA
CreateServiceA
ChangeServiceConfig2A
CloseServiceHandle
RegisterServiceCtrlHandlerA
SetServiceStatus
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegDeleteValueA
StartServiceCtrlDispatcherA
RegOpenKeyExA
RegCreateKeyExA
ole32
CoRevokeClassObject
CoCreateInstance
CoRegisterClassObject
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
CoInitializeEx
CoInitialize
oleaut32
SysFreeString
SysAllocString
RegisterTypeLi
VarUI4FromStr
LoadTypeLi
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ