Static task
static1
Behavioral task
behavioral1
Sample
a1e45a04ff50f937506615a5102e4f43_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a1e45a04ff50f937506615a5102e4f43_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a1e45a04ff50f937506615a5102e4f43_JaffaCakes118
-
Size
17KB
-
MD5
a1e45a04ff50f937506615a5102e4f43
-
SHA1
596a0559ed25ec19ea8ef013806a665973d92ee9
-
SHA256
135398ab487c40c8a9961d4827cb1e228648cd9b9df1c56718be1bfa08b888ab
-
SHA512
58838a70e7665f3ada5e685be79b10284373d6a7ed929582006e80e8af31ee850a095ac64805857da6849160b68cb8ef487a6fef5bb890da9ed09feb5d50cfb4
-
SSDEEP
384:1t1asgWaz+CqN8qU5pLEh+1F6Sb1yJWLd7j9wWPl:1t1A9+CqpUscyJW591Pl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a1e45a04ff50f937506615a5102e4f43_JaffaCakes118
Files
-
a1e45a04ff50f937506615a5102e4f43_JaffaCakes118.exe windows:4 windows x86 arch:x86
62320cff3ad93dca44beadd4320a704a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
??1type_info@@UAE@XZ
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
fseek
??3@YAXPAX@Z
_CxxThrowException
fprintf
strstr
srand
rand
malloc
atoi
free
printf
sprintf
fopen
fclose
ftell
kernel32
GetStartupInfoA
LocalFree
GetLogicalDriveStringsA
lstrcatA
CreateDirectoryA
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitThread
GlobalAlloc
GlobalLock
GlobalUnlock
GetLocaleInfoA
GetVersionExA
GetProcAddress
GetCurrentProcess
ReleaseMutex
SetErrorMode
CreateMutexA
GetCurrentDirectoryA
GetDriveTypeA
CreateProcessA
DeleteFileA
CloseHandle
WriteFile
CreateFileA
GetTickCount
ExpandEnvironmentStringsA
Sleep
lstrlenA
GetModuleFileNameA
GetLastError
CopyFileA
SetFileAttributesA
GetModuleHandleA
CreateThread
ExitProcess
DeleteCriticalSection
wsock32
socket
htons
connect
inet_ntoa
WSAStartup
WSACleanup
ioctlsocket
gethostbyname
sendto
recv
select
closesocket
send
wininet
InternetOpenUrlA
InternetOpenA
InternetReadFile
urlmon
URLDownloadToFileA
user32
BringWindowToTop
IsWindow
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
VkKeyScanA
ShowWindow
SetFocus
SetForegroundWindow
keybd_event
BlockInput
GetWindowTextA
EnumWindows
advapi32
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
VariantClear
SysAllocString
VariantInit
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE