Static task
static1
Behavioral task
behavioral1
Sample
a8f6caee984e564f20771f55cb121ef0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a8f6caee984e564f20771f55cb121ef0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a8f6caee984e564f20771f55cb121ef0_JaffaCakes118
-
Size
108KB
-
MD5
a8f6caee984e564f20771f55cb121ef0
-
SHA1
aa49f2036d4c0c2f0c6c6cb87275d0809b40690a
-
SHA256
3d2c900cdef0e82c78f9d8ef10842770f67b4a07564dd43821aae34a4cc9d4af
-
SHA512
de1e1e1973f4775245f994cc714bcacc3f1297629acbb9d04c0d492baf64d4dcb94e3b92b13642609457eba7592ce0d5d3407b583335430ae15e5767f523a39b
-
SSDEEP
1536:U2/vFipcIi0786WRlo8OXZrD+o7QGRntfcMFCvJgZP1aCc:UnpcB0xWRzOXZvN7QGRnt4EPgCc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a8f6caee984e564f20771f55cb121ef0_JaffaCakes118
Files
-
a8f6caee984e564f20771f55cb121ef0_JaffaCakes118.exe windows:4 windows x86 arch:x86
ebffe4118dd5fd479bb00645f5d73663
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc80
ord5286
ord5111
ord384
ord421
ord709
ord4749
ord501
ord6090
ord2164
ord2168
ord1084
ord762
ord3204
ord1280
ord2368
ord3302
ord1279
ord5637
ord1903
ord572
ord3164
ord4486
ord2991
ord2862
ord5200
ord1599
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2403
ord2415
ord2392
ord2408
ord2413
ord2396
ord2398
ord2400
ord2394
ord2410
ord2390
ord934
ord930
ord932
ord928
ord923
ord5233
ord5235
ord5960
ord5089
ord4282
ord4722
ord3403
ord5214
ord4185
ord6275
ord5073
ord1908
ord5152
ord4232
ord1402
ord3946
ord1617
ord1620
ord5915
ord6725
ord1545
ord2086
ord1063
ord3292
ord4244
ord1581
ord1643
ord354
ord3182
ord4262
ord5203
ord1401
ord5912
ord6724
ord1551
ord1670
ord1671
ord4890
ord4735
ord4212
ord5182
ord1794
ord4320
ord602
ord1929
ord6065
ord6283
ord347
ord6067
ord3641
ord4580
ord3576
ord5731
ord2367
ord2372
ord4240
ord1591
ord2095
ord741
ord5613
ord3684
ord6288
ord1439
ord1443
ord629
ord655
ord3830
ord1054
ord5975
ord2020
ord715
ord587
ord605
ord3161
ord3210
ord1934
ord310
ord2322
ord876
ord1123
ord578
ord757
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord2248
ord3948
ord4568
ord5230
ord5213
ord5566
ord2537
ord2731
ord2835
ord4307
ord2714
ord2838
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4481
ord4261
ord3333
ord566
ord4541
ord3683
ord1600
ord764
ord1207
msvcr80
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_initterm_e
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_invalid_parameter_noinfo
__CxxFrameHandler3
rand
??0exception@std@@QAE@ABQBD@Z
_setmbcp
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_invoke_watson
_except_handler4_common
?what@exception@std@@UBEPBDXZ
_unlock
srand
memcpy
??0exception@std@@QAE@ABV01@@Z
_CxxThrowException
memset
strncpy
_time64
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
_controlfp_s
kernel32
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
lstrlenA
GetModuleFileNameA
CreateProcessA
GlobalUnlock
GlobalLock
GlobalAlloc
LockResource
SizeofResource
LoadResource
FindResourceA
lstrcatA
lstrcpyA
Sleep
CreateThread
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
GetTempPathA
user32
SetWindowRgn
SendMessageA
EnableWindow
LoadIconA
GetSystemMetrics
wsprintfA
GetWindowRect
GetClientRect
GetDC
ReleaseDC
GetParent
InvalidateRect
UpdateWindow
gdi32
GetStockObject
GetObjectA
GetPixel
CombineRgn
CreateRectRgn
CreateFontA
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
CreateCompatibleBitmap
advapi32
RegCreateKeyA
RegSetValueExA
RegCloseKey
comctl32
InitCommonControlsEx
ole32
CreateStreamOnHGlobal
wininet
InternetGetConnectedState
gdiplus
GdiplusShutdown
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromStreamICM
GdiplusStartup
GdipDisposeImage
GdipAlloc
GdipFree
GdipCloneImage
GdipCreateBitmapFromStream
msvcp80
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?swap@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXAAV12@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ