Static task
static1
Behavioral task
behavioral1
Sample
759cb0d26b7a581bbe57f735496e8433_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
759cb0d26b7a581bbe57f735496e8433_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
759cb0d26b7a581bbe57f735496e8433_JaffaCakes118
-
Size
216KB
-
MD5
759cb0d26b7a581bbe57f735496e8433
-
SHA1
7d80b96280bb0f351d624ecf087dbb7b9051b27b
-
SHA256
2a1a4eb9f1a069a3ece92f59d1f006d7bd4302c8f8b84ea17287508abec27617
-
SHA512
4e33f6b9cf255762f005e7eb0b921e14ffe5662b5649a583dada86178d43543ef929197ea47c5a3122f91c6d7b5a74551fe5c16b0e1514a0b4c7ac148ab08290
-
SSDEEP
3072:cPWW5YMreReY93x+DNX2mBlGg9H2Y23JWRdmgODOiwv8+0X9C93vavpx:ujmlReg3qNGmCuVmJYXmQ8+0XMavpx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 759cb0d26b7a581bbe57f735496e8433_JaffaCakes118
Files
-
759cb0d26b7a581bbe57f735496e8433_JaffaCakes118.exe windows:4 windows x86 arch:x86
6a67e3df253ce9c1f04fca586eb66219
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrChrA
StrCmpNIA
StrNCatA
wnsprintfA
StrStrIA
StrStrA
StrToIntA
wininet
InternetOpenUrlA
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetCloseHandle
InternetReadFile
InternetQueryDataAvailable
InternetGetConnectedState
rpcrt4
UuidToStringA
UuidCreate
iphlpapi
GetAdaptersInfo
ws2_32
WSAStartup
WSACleanup
inet_ntoa
gethostbyname
kernel32
GetLocaleInfoA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetSystemInfo
VirtualAlloc
VirtualProtect
GetTimeZoneInformation
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetCPInfo
GetOEMCP
GetACP
CloseHandle
WriteFile
CreateFileA
LockResource
SizeofResource
LoadResource
FindResourceA
SetFileAttributesA
SetFileTime
GetFileTime
lstrcpyA
GetWindowsDirectoryA
VirtualQuery
GetTickCount
GetVolumeInformationA
WideCharToMultiByte
GetVersionExA
DeleteFileA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
lstrlenA
FindClose
FindFirstFileA
OpenFileMappingA
HeapFree
ReadFile
HeapAlloc
GetFileSize
GetProcessHeap
Module32Next
Module32First
CreateToolhelp32Snapshot
Process32Next
Process32First
GetLocalTime
SetEndOfFile
SetFilePointer
HeapReAlloc
GetCurrentThreadId
GetCurrentProcessId
Sleep
GetLastError
HeapDestroy
HeapCreate
IsBadReadPtr
CreateThread
lstrcmpiA
lstrcmpA
TerminateProcess
WaitForSingleObject
CreateRemoteThread
ResumeThread
WriteProcessMemory
GetModuleHandleA
CreateProcessA
DeviceIoControl
ExitProcess
GetModuleFileNameA
FileTimeToSystemTime
SystemTimeToFileTime
SetLastError
GetTempPathA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetExitCodeThread
OpenProcess
InitializeCriticalSection
MapViewOfFile
CreateFileMappingA
SetEnvironmentVariableA
SetUnhandledExceptionFilter
OpenMutexA
UnmapViewOfFile
ReleaseMutex
GetSystemDirectoryA
GetComputerNameA
GetShortPathNameA
MoveFileExA
VirtualFree
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
GetCurrentProcess
GetCurrentDirectoryA
GetFullPathNameA
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
InterlockedExchange
GetCommandLineA
GetStartupInfoA
GetDriveTypeA
FileTimeToLocalFileTime
RtlUnwind
GetStringTypeA
GetStringTypeW
FlushFileBuffers
HeapSize
SetStdHandle
CompareStringA
CompareStringW
CreateMutexA
IsBadWritePtr
user32
KillTimer
SetTimer
CreateWindowExA
GetForegroundWindow
EnumChildWindows
WaitForInputIdle
EnumThreadWindows
IsWindow
ShowWindow
DefWindowProcA
SetForegroundWindow
FindWindowA
PostMessageA
GetWindowThreadProcessId
GetClassNameA
GetWindowTextA
SendMessageA
wsprintfA
PostQuitMessage
DestroyWindow
RegisterClassExA
DispatchMessageA
TranslateMessage
GetMessageA
RegisterWindowMessageA
AttachThreadInput
EnumWindows
SetWindowPos
advapi32
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyA
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegOpenKeyA
RegQueryValueA
RegSetValueA
RegCreateKeyExA
RegOpenKeyExA
Sections
.text Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ