Static task
static1
Behavioral task
behavioral1
Sample
8a4da11885ddb2f858b32f6046cd66f5_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8a4da11885ddb2f858b32f6046cd66f5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8a4da11885ddb2f858b32f6046cd66f5_JaffaCakes118
-
Size
80KB
-
MD5
8a4da11885ddb2f858b32f6046cd66f5
-
SHA1
8b6949020e4f1fc4cf01d44ff40758cfd394c171
-
SHA256
552de22ff1de3cf1bd72dd354180babbac06cdbcd47e10495ceeffe1aab6b17e
-
SHA512
ecf9f7840204c2bd977d25108e5b2c334140b08b4d9b9697aadc881b29910805fa73c13675b6986939dcdc3394ba9c4402be89cac424933b7a002cb988e9a4ee
-
SSDEEP
1536:W7eHuYVkO1oQcWcrM2F9U06KN7OmFRsmiDC+:WiHuKFcrM2FC0xFqZDC+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8a4da11885ddb2f858b32f6046cd66f5_JaffaCakes118
Files
-
8a4da11885ddb2f858b32f6046cd66f5_JaffaCakes118.exe windows:4 windows x86 arch:x86
b74403454f48c34cf1d22887be402e07
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
wsprintfA
GetMenu
FindWindowExA
SendMessageA
BlockInput
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
CharLowerA
FindWindowA
ShowWindow
BringWindowToTop
SetForegroundWindow
SetFocus
IsWindow
VkKeyScanA
keybd_event
EnumWindows
GetWindowTextA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
VariantClear
VariantInit
SysFreeString
SysAllocString
msvcrt
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
wcslen
toupper
fgets
fclose
fprintf
_except_handler3
strncat
fopen
fread
strcat
_strlwr
memcpy
_vsnprintf
strcmp
strtok
srand
strncpy
memcmp
_snprintf
memset
atoi
strchr
rand
strcpy
strlen
strstr
??2@YAPAXI@Z
__CxxFrameHandler
malloc
sprintf
realloc
free
_stricmp
getchar
_strdup
urlmon
URLDownloadToFileA
kernel32
TerminateThread
lstrcpyA
lstrcmpA
lstrcpynA
GetSystemTime
ReadFile
GlobalLock
GlobalUnlock
FindFirstFileA
SetCurrentDirectoryA
GetFullPathNameA
FindNextFileA
FindClose
GetFileSize
GetDriveTypeA
MultiByteToWideChar
WideCharToMultiByte
GetStartupInfoA
SetFilePointer
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GlobalAlloc
lstrcatA
CreateDirectoryA
lstrlenA
Process32First
Process32Next
CreateToolhelp32Snapshot
TerminateProcess
Module32Next
OpenProcess
ReadProcessMemory
CreateFileA
WriteFile
GetWindowsDirectoryA
SetFileAttributesA
CopyFileA
GetFileAttributesA
GetVersionExA
GetLocaleInfoA
CreateMutexA
GetTickCount
ReleaseMutex
ExitThread
GetCurrentProcess
CloseHandle
LoadLibraryA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
ExpandEnvironmentStringsA
GetLogicalDriveStringsA
CreateProcessA
WaitForSingleObject
lstrcmpiA
CreateThread
GetLastError
GetTempPathA
Sleep
InterlockedDecrement
ExitProcess
GlobalFree
Module32First
advapi32
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
GetUserNameA
ws2_32
connect
socket
ioctlsocket
closesocket
Sections
.text Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE