Static task
static1
Behavioral task
behavioral1
Sample
a134a51ec801b9d8ae1e8886dcf8eee2_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a134a51ec801b9d8ae1e8886dcf8eee2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a134a51ec801b9d8ae1e8886dcf8eee2_JaffaCakes118
-
Size
96KB
-
MD5
a134a51ec801b9d8ae1e8886dcf8eee2
-
SHA1
6b423e087a9cab7ed54324224cfdd14d38f7d712
-
SHA256
fccd2a0f2ef9772f9211debf70fa821b95a802df20a989636e9d9cb332dfd54c
-
SHA512
9a4a2d0f9d6e5b04f1b7a5a712090b75567570aedfde7014c07958525f6dee4463c769d6ddbefd0c424f6e960d8f261bba4a5c519260a3c175b91b8f57c26936
-
SSDEEP
1536:1IshNjVxCcnANLz89dZUrR/zS+gtb+zoO/IU4:PjjVxCbNeUCtbbO/IU4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a134a51ec801b9d8ae1e8886dcf8eee2_JaffaCakes118
Files
-
a134a51ec801b9d8ae1e8886dcf8eee2_JaffaCakes118.exe windows:4 windows x86 arch:x86
4ea798d6b460ed547927ecda4c245f39
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
CreateFileA
GetTempPathA
WaitForMultipleObjectsEx
GetSystemDirectoryA
OpenEventA
OpenMutexA
GetVolumeInformationA
GetModuleHandleA
GetModuleFileNameA
CreateMutexA
CreateEventA
SetLastError
ReleaseMutex
GetLastError
WaitForSingleObject
DeleteFileA
SetEvent
GetStartupInfoA
LoadLibraryA
GetProcAddress
FindFirstFileA
CreateDirectoryA
GetVersionExA
FindClose
GetWindowsDirectoryA
GetShortPathNameA
MoveFileExA
WritePrivateProfileSectionA
GetPrivateProfileSectionA
DeviceIoControl
SystemTimeToFileTime
CloseHandle
GetSystemTimeAsFileTime
advapi32
RegEnumValueA
RegQueryInfoKeyA
RegDeleteValueA
RegEnumKeyExA
RegSetValueExA
RegDeleteKeyA
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
wininet
HttpQueryInfoA
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
InternetGetConnectedState
msvcrt
strcmp
strcat
strlen
free
__dllonexit
_onexit
??1type_info@@UAE@XZ
_ui64toa
memset
strcpy
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
__CxxFrameHandler
_purecall
exit
strchr
_atoi64
sprintf
tolower
??2@YAPAXI@Z
_ultoa
??0exception@@QAE@XZ
strstr
_splitpath
??0exception@@QAE@ABV0@@Z
?what@exception@@UBEPBDXZ
??1exception@@UAE@XZ
_exit
_CxxThrowException
_XcptFilter
toupper
_itoa
shell32
ShellExecuteA
ws2_32
inet_addr
Sections
.text Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE