Static task
static1
Behavioral task
behavioral1
Sample
a4e5d6da2db3e7151b8ab9a0c25738a4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a4e5d6da2db3e7151b8ab9a0c25738a4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a4e5d6da2db3e7151b8ab9a0c25738a4_JaffaCakes118
-
Size
1009KB
-
MD5
a4e5d6da2db3e7151b8ab9a0c25738a4
-
SHA1
99e6e314e0fcb2046b659b0b188d0f699bafdbc8
-
SHA256
f938c8d802e92d075b1e343209883ce9456ea1b5f59d7e5557f6cce697fcb30f
-
SHA512
ec56047551f9905892773210124d596405fc0e7ad9306fc077645414807524eec0ac98f92b731182bee9cc37e9a0b09ea6008344dad54eb8a8610c1e7dcd8b92
-
SSDEEP
24576:oQtTHoMtA6pr7C4MQ9iOYjsfhKnZ0l8bH1J8JJxoWLMkipHv:nTHomAMr7n97YYfGP0MkWP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a4e5d6da2db3e7151b8ab9a0c25738a4_JaffaCakes118
Files
-
a4e5d6da2db3e7151b8ab9a0c25738a4_JaffaCakes118.exe windows:4 windows x86 arch:x86
bfcc028f93891e935f1f8b9b1e9b24db
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32 mfc42
Beep q
mfc42
ord823
ord825
msvcrt
malloc
strncat
strncpy
sprintf
__CxxFrameHandler
_ftol
exit
rand
srand
time
strcspn
strstr
free
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
kernel32
Sleep
ReadFile
CreateProcessA
GetSystemDirectoryA
GetStartupInfoA
CloseHandle
CreatePipe
FindClose
FindNextFileA
GetLastError
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
DeleteFileA
CopyFileA
MoveFileA
FreeLibrary
GetProcAddress
LoadLibraryA
WinExec
GetTempPathA
GetCurrentProcess
TerminateProcess
OpenProcess
Process32Next
GetPriorityClass
Module32First
Process32First
CreateToolhelp32Snapshot
GetTickCount
SetThreadPriority
GetCurrentThread
WriteFile
CreateFileA
GetFileSize
CreateThread
lstrcpyA
GlobalMemoryStatus
GetVersionExA
GetComputerNameA
ResumeThread
SetPriorityClass
lstrcatA
GetEnvironmentVariableA
GetShortPathNameA
lstrlenA
GetModuleFileNameA
HeapAlloc
GetProcessHeap
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleA
InterlockedExchange
user32
CloseWindowStation
CloseDesktop
GetProcessWindowStation
GetThreadDesktop
keybd_event
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
GetSystemMetrics
IsWindow
SendMessageA
SetCursorPos
OpenWindowStationA
wsprintfA
CloseWindow
CreateWindowExA
mouse_event
ExitWindowsEx
gdi32
DeleteDC
GetDIBits
DeleteObject
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
advapi32
RegisterServiceCtrlHandlerA
LookupPrivilegeValueA
OpenProcessToken
DeleteService
OpenServiceA
OpenSCManagerA
RegOpenKeyExA
StartServiceCtrlDispatcherA
CreateServiceA
StartServiceA
RegOpenKeyA
RegSetValueExA
CloseServiceHandle
RegCloseKey
SetServiceStatus
AdjustTokenPrivileges
shell32
SHGetFileInfoA
ShellExecuteA
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
ws2_32
setsockopt
send
recv
gethostbyname
inet_addr
WSAStartup
closesocket
connect
socket
htons
shutdown
inet_ntoa
sendto
WSASocketA
htonl
gethostname
WSAIoctl
iphlpapi
GetAdaptersInfo
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
SE Size: 15KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
SE Size: 924KB - Virtual size: 928KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
SE Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ