Static task
static1
Behavioral task
behavioral1
Sample
7701356f35ff99d27c0c37b125bb6c9c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7701356f35ff99d27c0c37b125bb6c9c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7701356f35ff99d27c0c37b125bb6c9c_JaffaCakes118
-
Size
84KB
-
MD5
7701356f35ff99d27c0c37b125bb6c9c
-
SHA1
93129fccbf0b999e9ce9ef6d3d71df5ef3093c3b
-
SHA256
fc80481f218fb5f83e5ed087ac8e57f0c848a35de8bb7232bd42547998d7713b
-
SHA512
37b46ee37e3a548335cbf6edf78c775e01f2213220639a2f989aa0403f5a065a8df021a7c22398d82767dafcc5413119a3aeaad34032ce9846e3bc4c08031ba4
-
SSDEEP
1536:jxavMfWkXk007JdcwWSI9J+ONdATGKyg6FtLHXS++TQGDt:j8vMfWokV+5bJ+4Fa6FV8t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7701356f35ff99d27c0c37b125bb6c9c_JaffaCakes118
Files
-
7701356f35ff99d27c0c37b125bb6c9c_JaffaCakes118.exe windows:4 windows x86 arch:x86
57aa84ff5547164067962934af03ab99
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetKeyboardType
GetSysColor
LoadImageA
GetMonitorInfoA
GetDoubleClickTime
GetSysColorBrush
advapi32
LookupAccountSidA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegEnumValueA
RegCloseKey
OpenProcessToken
RegGetKeySecurity
RegOpenKeyExA
GetTokenInformation
psapi
GetModuleInformation
ws2_32
htonl
WSAStartup
wininet
InternetReadFile
HttpQueryInfoA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
netapi32
NetUserGetInfo
NetApiBufferFree
kernel32
GetStringTypeW
FlushFileBuffers
GetLocaleInfoA
VirtualProtect
GetSystemInfo
MultiByteToWideChar
GetStringTypeA
LCMapStringW
LCMapStringA
SetStdHandle
GetCPInfo
GetOEMCP
GetACP
VirtualAlloc
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
SetUnhandledExceptionFilter
VirtualQuery
InterlockedExchange
OpenProcess
GetFileTime
GetFirmwareEnvironmentVariableA
GetFileType
GetStdHandle
GetSystemDirectoryA
CreateDirectoryA
GetVolumeInformationA
GetProcessPriorityBoost
GetVersion
GetTickCount
SetErrorMode
GetCommandLineA
Sleep
CloseHandle
GetCurrentProcess
WriteFile
CreateFileA
ExitProcess
CreateMutexA
OpenMutexA
CreateProcessA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
SetEnvironmentVariableA
CopyFileA
SetFileAttributesA
GetLastError
CreateThread
GetLocalTime
GetDriveTypeA
GetLogicalDriveStringsA
GetSystemTimeAsFileTime
GetProcAddress
GetModuleHandleA
TerminateProcess
RtlUnwind
GetStartupInfoA
GetVersionExA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
HeapFree
HeapAlloc
HeapReAlloc
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
HeapDestroy
HeapCreate
VirtualFree
SetFilePointer
LoadLibraryA
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE