Static task
static1
Behavioral task
behavioral1
Sample
842caf6a2541711be2ff90166a995c7b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
842caf6a2541711be2ff90166a995c7b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
842caf6a2541711be2ff90166a995c7b_JaffaCakes118
-
Size
536KB
-
MD5
842caf6a2541711be2ff90166a995c7b
-
SHA1
021200c89d12f1c5bd3b8a7c7b01e4f125a905ac
-
SHA256
895606cac13258dafa2bd8be419ccb1c064ae12e7728da09bddac52a67097487
-
SHA512
591300dbf54bf50827886f77472fc8042cbdc3591f854c232ac0ac7eeb6864e82c015e0a5364713f279666f3c23f8d1e262188aa9df068944c18b03b9aeac130
-
SSDEEP
6144:lAZeQv3aJSJr6Lk9R87t39qfZLJRdl0Ok9ygWNgSCNNxhTfI3rO3BzB9871ohzlA:lynC6WLwR87oZLLnSDxhDhhzlVNzQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 842caf6a2541711be2ff90166a995c7b_JaffaCakes118
Files
-
842caf6a2541711be2ff90166a995c7b_JaffaCakes118.exe windows:4 windows x86 arch:x86
6262ab0baafe083f4dd71653dcfaf667
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
ntohl
inet_addr
gethostname
WSAStartup
WSACleanup
inet_ntoa
gethostbyname
kernel32
MultiByteToWideChar
GetModuleFileNameA
GetProcAddress
lstrlenA
WideCharToMultiByte
GetTickCount
FreeLibrary
CreateMutexA
CloseHandle
GetLastError
SetEndOfFile
GetDiskFreeSpaceExA
GetCurrentDirectoryA
LockResource
SizeofResource
LoadResource
FindResourceA
ReadFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
RaiseException
LoadLibraryA
SetStdHandle
GetFileAttributesA
CreateDirectoryA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapSize
HeapReAlloc
GetCurrentProcess
TerminateProcess
WriteFile
GetOEMCP
CreateFileA
FlushFileBuffers
GetCommandLineA
GetVersion
LeaveCriticalSection
SetFilePointer
RtlUnwind
InterlockedDecrement
InterlockedIncrement
GetTimeZoneInformation
GetSystemTime
GetLocalTime
DeleteFileA
GetACP
GetCPInfo
GetModuleHandleA
GetStartupInfoA
TlsAlloc
ExitProcess
HeapAlloc
HeapFree
GetCurrentThreadId
TlsSetValue
DeleteCriticalSection
SetLastError
TlsGetValue
InitializeCriticalSection
EnterCriticalSection
user32
LoadStringA
PostMessageA
GetDlgItem
ShowWindow
KillTimer
SetDlgItemTextA
SendMessageA
EndDialog
GetClientRect
SetWindowPos
EnableWindow
MessageBoxA
DefWindowProcA
DialogBoxParamA
GetCursorPos
LoadMenuA
GetSubMenu
SetForegroundWindow
TrackPopupMenu
SetFocus
GetWindowLongA
LoadIconA
GetWindowTextA
SetWindowTextA
SetTimer
gdi32
SetTextColor
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyA
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
Shell_NotifyIconA
ole32
CoLoadLibrary
CoFreeLibrary
CoUninitialize
wininet
InternetCanonicalizeUrlA
Sections
.text Size: 80KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 420KB - Virtual size: 418KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ