Static task
static1
Behavioral task
behavioral1
Sample
8c1424633ab82795a5f9f83b07c66b80_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8c1424633ab82795a5f9f83b07c66b80_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8c1424633ab82795a5f9f83b07c66b80_JaffaCakes118
-
Size
92KB
-
MD5
8c1424633ab82795a5f9f83b07c66b80
-
SHA1
8a7a793355d6e4f0688d459dfa2b771b03e2db33
-
SHA256
2805d0e14fd9e6f73240634eeebd5d5ec7e17735e5dd2e5add474b4bbbb371fb
-
SHA512
0815ae8184da0b07e2ae111d639723a44c258524e1c5cfd11e68e7e7d096591fe2b436cbde79a39734e5196e1103b4c6bdf96ad4a19634c29e6c9a51fd0cc812
-
SSDEEP
1536:NhQmP6/Ae+NAu9GKxp7kcg+azvIUnRK7hbXwDE9sDCWV/yt5:N9PWAeI9GKlxU6VsDCWV6t5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c1424633ab82795a5f9f83b07c66b80_JaffaCakes118
Files
-
8c1424633ab82795a5f9f83b07c66b80_JaffaCakes118.exe windows:4 windows x86 arch:x86
ffb1f90efc8387af6067be5a1df1d31c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetErrorDlg
advapi32
RegCloseKey
RegOpenKeyExA
SetSecurityDescriptorDacl
RegDeleteValueA
RegSetValueExA
InitializeSecurityDescriptor
RegQueryValueExA
user32
SetWindowsHookExA
PeekMessageA
DispatchMessageA
UnhookWindowsHookEx
GetKeyNameTextA
GetKeyboardState
ToAscii
CallNextHookEx
GetDesktopWindow
ExitWindowsEx
PostThreadMessageA
GetMessageA
dnsapi
DnsQuery_A
DnsRecordListFree
kernel32
GetStringTypeA
GetStringTypeW
CompareStringA
LCMapStringW
LCMapStringA
GetTimeZoneInformation
GetLocaleInfoA
HeapSize
GetOEMCP
GetACP
GetCPInfo
GetSystemTimeAsFileTime
CompareStringW
SetEnvironmentVariableA
TerminateProcess
GetVersionExA
SetProcessWorkingSetSize
GetCurrentProcess
GetModuleHandleA
Sleep
GetCurrentThreadId
ReadFile
PeekNamedPipe
GetExitCodeProcess
CloseHandle
CreateProcessA
GetStartupInfoA
CreatePipe
GetLastError
CreateThread
WaitForSingleObject
HeapFree
HeapAlloc
GetProcAddress
ExitProcess
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
HeapReAlloc
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetFileType
CreateFileA
GetCommandLineA
GetProcessHeap
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
GetStdHandle
GetModuleFileNameA
FlushFileBuffers
SetHandleCount
LoadLibraryA
InitializeCriticalSection
GetFullPathNameA
GetCurrentDirectoryA
MultiByteToWideChar
RtlUnwind
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetFilePointer
SetStdHandle
SetEndOfFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
Sections
.text Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE