Static task
static1
Behavioral task
behavioral1
Sample
a56b9cd0e0b0e59036745fcc090990e9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a56b9cd0e0b0e59036745fcc090990e9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a56b9cd0e0b0e59036745fcc090990e9_JaffaCakes118
-
Size
96KB
-
MD5
a56b9cd0e0b0e59036745fcc090990e9
-
SHA1
1e5f5e2d36e98a7054776975d51652e6817f4fe0
-
SHA256
59a6ca3dd4fc0670f66a5615ee8117d3567518967dfa02a86bb89aa186c55c2a
-
SHA512
c2f085cd79ef7acfedac27b88cc3c9f181e6d9a0b5fcf55e451caf7a63285babdb065bade9763dcb3016435626cef1960a478d2048652aa1a92cb239cf192df6
-
SSDEEP
1536:/aHYSiGXog7injdqjk1N4Ttmvuf07Y6G82kh3j7PdnGVIuK1G:+iGXzinjU44Wy07Y6NX7PFGVNv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a56b9cd0e0b0e59036745fcc090990e9_JaffaCakes118
Files
-
a56b9cd0e0b0e59036745fcc090990e9_JaffaCakes118.exe windows:4 windows x86 arch:x86
e1b8d750fd58886b619c1f2a0dbd29c3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
SHGetFileInfoA
SHGetSpecialFolderPathW
StrStrIA
wininet
InternetQueryOptionW
HttpQueryInfoW
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetQueryDataAvailable
HttpQueryInfoA
InternetOpenUrlA
InternetGetConnectedState
shlwapi
PathAppendW
PathFindExtensionA
PathAppendA
ntdll
wcsstr
strrchr
_wcsnicmp
atoi
_memicmp
sscanf
_chkstk
sprintf
_vsnprintf
wcsrchr
_snwprintf
strchr
strstr
_stricmp
_strnicmp
isxdigit
wcscmp
wcslen
memmove
strncmp
toupper
vsprintf
isalnum
strncat
strncpy
_snprintf
ws2_32
inet_addr
closesocket
connect
ioctlsocket
socket
htons
sendto
send
WSAStartup
inet_ntoa
getpeername
ntohs
setsockopt
select
recv
WSACleanup
gethostbyname
msvcrt
calloc
free
??2@YAPAXI@Z
malloc
realloc
strtok
srand
rand
??3@YAXPAX@Z
kernel32
HeapReAlloc
lstrcatA
GetProcessHeap
DeviceIoControl
CreateToolhelp32Snapshot
CreateRemoteThread
VirtualFreeEx
OpenProcess
VirtualAllocEx
WriteProcessMemory
ReadProcessMemory
InterlockedIncrement
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
OpenFileMappingA
ReleaseMutex
GetWindowsDirectoryA
GetCurrentProcessId
OpenMutexA
CreateDirectoryA
GetFileSize
LockFile
SetCurrentDirectoryA
FindFirstFileA
FindNextFileA
FindClose
GetTempFileNameW
FlushFileBuffers
DisconnectNamedPipe
CreateNamedPipeA
ConnectNamedPipe
CreateMutexA
InitializeCriticalSection
FreeLibrary
IsBadReadPtr
VirtualFree
VirtualProtect
DeleteFileW
GetModuleFileNameA
ReadFile
GetVersionExA
GetLocaleInfoA
GetModuleFileNameW
CopyFileW
lstrcpynW
GetVolumeInformationW
Process32First
Process32Next
GetFileTime
FileTimeToSystemTime
GetSystemTime
CreateThread
WaitForSingleObject
Beep
EnterCriticalSection
LeaveCriticalSection
lstrcpyA
MoveFileExA
lstrcmpA
WideCharToMultiByte
MoveFileExW
lstrcmpW
ExitThread
DeleteFileA
SetFileAttributesA
lstrlenA
GetFileAttributesA
SetFileAttributesW
GetFileAttributesW
MultiByteToWideChar
HeapFree
HeapAlloc
lstrcpyW
ExitProcess
GetTickCount
lstrcpynA
Sleep
WriteFile
SetFilePointer
CreateProcessW
CreateFileA
VirtualAlloc
CloseHandle
GetCurrentThreadId
GetLastError
CreateFileW
GetWindowsDirectoryW
lstrcatW
user32
TranslateMessage
GetMessageA
DispatchMessageA
CreateWindowExA
RegisterClassExA
DefWindowProcA
wvsprintfA
RegisterDeviceNotificationA
MessageBoxA
advapi32
RegCloseKey
LookupPrivilegeValueA
OpenProcessToken
CryptGetHashParam
CryptDestroyHash
RegCreateKeyExW
RegSetValueExW
AdjustTokenPrivileges
CryptAcquireContextA
CryptCreateHash
CryptReleaseContext
CryptHashData
ole32
CoInitialize
CoCreateInstance
Sections
.text Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ