Static task
static1
Behavioral task
behavioral1
Sample
89bb795aa9a3f3f87b70004fe63097d5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
89bb795aa9a3f3f87b70004fe63097d5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
89bb795aa9a3f3f87b70004fe63097d5_JaffaCakes118
-
Size
688KB
-
MD5
89bb795aa9a3f3f87b70004fe63097d5
-
SHA1
da2537d42065f9918160524d9121a2e7cd283367
-
SHA256
da9f80f28eb70862717a6c84a30f05aaa7c2e8d2ccd54da8d97b37c07790c7cd
-
SHA512
2d7603df2f85042279ceee3cd2f534153971836736ed8c76bf7a81532230fd17c0375ba8237a79bc771bb0105d22eaeff199228460a8bbc197f2f9b8529204a8
-
SSDEEP
12288:vzytmBLX2pOazpmaI9aAs2zT5jmIpwZqkKeb9oKGeS9ozE2OlFxboHBzujL8i:vdLXQOazpmalv2z96hfKebQozsjpoHBK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 89bb795aa9a3f3f87b70004fe63097d5_JaffaCakes118
Files
-
89bb795aa9a3f3f87b70004fe63097d5_JaffaCakes118.exe windows:4 windows x86 arch:x86
70c1112891499003eceb597964dc653d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
inet_addr
WSACleanup
inet_ntoa
gethostbyname
gethostname
WSAStartup
ntohl
kernel32
GetModuleFileNameA
MultiByteToWideChar
GetProcAddress
lstrlenA
WideCharToMultiByte
GetTickCount
FreeLibrary
LoadLibraryA
CloseHandle
GetLastError
CreateMutexA
GetDiskFreeSpaceExA
GetCurrentDirectoryA
LockResource
SizeofResource
LoadResource
FindResourceA
CreateFileA
FlushFileBuffers
SetStdHandle
SetFilePointer
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
ReadFile
SetEndOfFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
RaiseException
UnhandledExceptionFilter
HeapSize
HeapReAlloc
GetCurrentProcess
TerminateProcess
WriteFile
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
DeleteCriticalSection
InitializeCriticalSection
TlsGetValue
LeaveCriticalSection
RtlUnwind
InterlockedDecrement
InterlockedIncrement
GetTimeZoneInformation
GetSystemTime
GetLocalTime
DeleteFileA
CreateDirectoryA
GetFileAttributesA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapAlloc
HeapFree
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
EnterCriticalSection
user32
GetDlgItem
KillTimer
SetDlgItemTextA
PostMessageA
LoadStringA
EndDialog
SetTimer
ShowWindow
SetForegroundWindow
GetClientRect
SetWindowPos
EnableWindow
IsWindow
PeekMessageA
DefWindowProcA
DialogBoxParamA
GetCursorPos
LoadMenuA
GetSubMenu
MessageBoxA
TrackPopupMenu
SetFocus
GetWindowLongA
LoadIconA
GetWindowTextA
SetWindowTextA
SendMessageA
gdi32
SetTextColor
advapi32
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyA
shell32
Shell_NotifyIconA
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
ole32
CoUninitialize
CoFreeLibrary
CoLoadLibrary
wininet
InternetCanonicalizeUrlA
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 572KB - Virtual size: 571KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ