Static task
static1
Behavioral task
behavioral1
Sample
a484ae42336b27e7b5cdf03cfc8e782b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a484ae42336b27e7b5cdf03cfc8e782b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a484ae42336b27e7b5cdf03cfc8e782b_JaffaCakes118
-
Size
242KB
-
MD5
a484ae42336b27e7b5cdf03cfc8e782b
-
SHA1
0326c46b8cebd19c0e1c1b32c901611f8f90f463
-
SHA256
63b613604dce7c7a9d59a965b696e9c7888815555351f99952c64563c2c4d29c
-
SHA512
c50e1318755bef2ee406ff477f0a03fa7b7edbfd7af3bd4061aa53a88b616ee42ad723242a58caa65d4ba0b13235e68b8055ba5435cdd027da297272ff2fd1d4
-
SSDEEP
6144:wzTpocAXXe8jEDKOF64+VHKdrJ3KN47gUDuMsRj+OcjS:wztSlEDKO44+JKBs408ulQOc+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a484ae42336b27e7b5cdf03cfc8e782b_JaffaCakes118
Files
-
a484ae42336b27e7b5cdf03cfc8e782b_JaffaCakes118.exe windows:4 windows x86 arch:x86
1a1d8d7f417296b009becfa935c8b7a4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersion
CreateMutexA
GetStringTypeA
VirtualAlloc
GetProcessHeap
OpenEventA
GetSystemDefaultLangID
GetFileAttributesA
LocalAlloc
GetFileAttributesW
CopyFileA
GetExitCodeThread
GlobalDeleteAtom
GetCurrentThreadId
EnumCalendarInfoW
IsBadStringPtrA
GetProcessHeaps
GetHandleInformation
ExitThread
IsValidLocale
FindAtomW
TlsAlloc
ReplaceFileW
lstrcatA
IsBadCodePtr
lstrcpyA
GlobalGetAtomNameW
lstrcpynW
FreeResource
IsValidCodePage
ConnectNamedPipe
GetSystemDefaultLCID
SetErrorMode
OpenMutexW
CreateFiber
CompareStringA
QueryPerformanceCounter
GetCommandLineA
CopyFileExW
GetNamedPipeInfo
GlobalGetAtomNameA
EnumDateFormatsW
user32
LoadCursorA
CreateDesktopA
EnableMenuItem
CreateAcceleratorTableW
SetWindowRgn
UnregisterClassW
SetWindowTextW
GetSystemMetrics
GetClassInfoExA
CheckMenuItem
gdi32
AddFontResourceA
SelectObject
GetCurrentPositionEx
WidenPath
CreateHatchBrush
GetTextExtentExPointI
CreateDIBPatternBrushPt
GetEnhMetaFileDescriptionW
TranslateCharsetInfo
advapi32
RegOpenKeyExW
RegFlushKey
RegReplaceKeyA
RegSaveKeyW
RegQueryValueW
RegDeleteValueW
setupapi
SetupDiGetHwProfileList
SetupDiSetClassInstallParamsW
SetupQueryInfVersionInformationW
SetupDiGetCustomDevicePropertyW
SetupDiGetClassImageListExW
CM_Open_Class_Key_ExA
SetupQueueCopyIndirectA
CM_Enumerate_Enumerators_ExA
SetupQuerySpaceRequiredOnDriveW
inetcomm
MimeOleSMimeCapInit
HrAthGetFileNameW
MimeEditDocumentFromStream
MimeOleSetPropA
MimeEditCreateMimeDocument
MimeOleCreatePropertySet
MimeOleSMimeCapAddSMimeCap
MimeOleGenerateMID
MimeOleGetContentTypeExt
wsock32
connect
__WSAFDIsSet
getservbyport
sendto
inet_addr
getnetbyname
ntohs
inet_ntoa
GetAcceptExSockaddrs
WSAAsyncSelect
rexec
getsockopt
WSARecvEx
Sections
.cM3/J Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.k,? Size: 2KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.)# Size: 1024B - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.6wWGX Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.&m2 Size: 2KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bb Size: 1KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.x Size: 3KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Q7 Size: 2KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.)I8 Size: 2KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 210KB - Virtual size: 210KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 690B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ