Static task
static1
Behavioral task
behavioral1
Sample
88cd5d6d96e5f46f471dc480cdfeb49d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
88cd5d6d96e5f46f471dc480cdfeb49d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
88cd5d6d96e5f46f471dc480cdfeb49d_JaffaCakes118
-
Size
2.1MB
-
MD5
88cd5d6d96e5f46f471dc480cdfeb49d
-
SHA1
24be3774e26885b83596b0aa7358b1614e90c17a
-
SHA256
9a23a824a100755f94537e42c37717b01d25d49681ff562c6d4ce516516a0312
-
SHA512
820c032e6f85df37038b645875cd6bab28d79c5edc74bf28e0256fe0a1ade6fcec7b6801c2ee6aa8837e5a2f271c912705f2c0a116ec4511229a7e079de0e67f
-
SSDEEP
24576:cwzmVgzL9EUMF2pRenXalUla/vcuZrPj686ZVfA04P8PHVuvWUcRWpdSBUPdBJ2M:t9EUM38UA/Pr6VY0/HkFdPnJ798/IwGl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 88cd5d6d96e5f46f471dc480cdfeb49d_JaffaCakes118
Files
-
88cd5d6d96e5f46f471dc480cdfeb49d_JaffaCakes118.exe windows:4 windows x86 arch:x86
486c6916918c00887b8e3717750bdf21
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_DrawIndirect
ImageList_Duplicate
ws2_32
WSASetBlockingHook
WSASocketW
WSAEnumNetworkEvents
WSAEnumNameSpaceProvidersA
WSASetLastError
WSAGetServiceClassInfoW
WSAAsyncGetHostByName
getsockname
ole32
CoReleaseMarshalData
CLSIDFromString
advapi32
SetFileSecurityW
ImpersonateLoggedOnUser
LookupAccountNameW
AccessCheckAndAuditAlarmW
RegDeleteKeyA
CryptHashData
GetSidSubAuthority
AccessCheck
RegCreateKeyExA
ReportEventA
GetSidIdentifierAuthority
DeleteAce
CryptImportKey
GetSecurityDescriptorLength
MapGenericMask
GetNamedSecurityInfoA
ObjectCloseAuditAlarmW
IsTextUnicode
user32
EnumDisplaySettingsA
CharLowerW
DrawTextA
UpdateWindow
IsCharAlphaA
LoadAcceleratorsA
SwapMouseButton
GrayStringW
SendMessageW
DispatchMessageA
UnregisterDeviceNotification
kernel32
GlobalFindAtomA
QueryDosDeviceA
RemoveDirectoryW
ReadConsoleInputW
GetEnvironmentStringsW
AllocConsole
SetThreadPriorityBoost
GetStartupInfoA
GlobalFindAtomW
GlobalDeleteAtom
FindFirstFileExW
GetSystemTimeAsFileTime
SetConsoleActiveScreenBuffer
ExpandEnvironmentStringsW
WritePrivateProfileSectionW
GetTempFileNameA
FatalAppExitA
SetConsoleWindowInfo
GetTapeStatus
RemoveDirectoryA
EnumCalendarInfoA
ReadConsoleA
ExitThread
ExitProcess
FlushConsoleInputBuffer
GetFileAttributesExA
LoadLibraryExA
GlobalFree
CreateIoCompletionPort
GlobalGetAtomNameW
EndUpdateResourceA
ReleaseSemaphore
GetCommModemStatus
GetCPInfo
WritePrivateProfileStringW
EnumSystemCodePagesA
LocalLock
EraseTape
GetOEMCP
lstrcpynA
GetSystemTimeAdjustment
GetLogicalDriveStringsA
SetProcessWorkingSetSize
FindCloseChangeNotification
EnumResourceLanguagesW
SetupComm
WaitNamedPipeA
VirtualLock
SetFileTime
SetCurrentDirectoryA
SetConsoleTitleA
GetLargestConsoleWindowSize
ConnectNamedPipe
msvcrt
wcsncat
_wtol
_chdrive
_getch
_vsnwprintf
fputc
_spawnvp
_itoa
_wcsupr
perror
_mbsncmp
_wfreopen
_wcslwr
_get_osfhandle
_mbslen
memmove
realloc
_wcsdup
__doserrno
fgets
strncpy
fputws
_strnicoll
_sopen
fflush
putchar
_beginthread
Sections
.text Size: 19KB - Virtual size: 267KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ