Static task
static1
Behavioral task
behavioral1
Sample
a9cfc6cf103b6335c4abb7b2f1b4ff9c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a9cfc6cf103b6335c4abb7b2f1b4ff9c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a9cfc6cf103b6335c4abb7b2f1b4ff9c_JaffaCakes118
-
Size
104KB
-
MD5
a9cfc6cf103b6335c4abb7b2f1b4ff9c
-
SHA1
f729c280708fe96b61ebbae1fda67630c6e26db1
-
SHA256
41c0be4acc28fc7a0f39e2f43a56b11757bc28717860c59767801cf98aa4639b
-
SHA512
30a2dfdd4830b9576ead9392e9cd1c6f4bcf1b13e167d7ad0e783472b86e78d11c384e504890a8f900a9ae418ca00db4b12b01dc38a475d8d5ae9a180b2ce2a5
-
SSDEEP
1536:gSqdQOJTYOXqwF5HZM6HTqlc9IybnHgz35pkIdRr:0vJY87M0Tqlc9IAU3Bz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a9cfc6cf103b6335c4abb7b2f1b4ff9c_JaffaCakes118
Files
-
a9cfc6cf103b6335c4abb7b2f1b4ff9c_JaffaCakes118.exe windows:4 windows x86 arch:x86
8e552b99bb4e46b27c18db5531a65def
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
GetThreadLocale
GetStartupInfoA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetCommandLineA
FreeLibrary
ExitProcess
CreateThread
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileA
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
WritePrivateProfileStringA
WinExec
VirtualQueryEx
TerminateProcess
Sleep
SetFileAttributesA
ReadProcessMemory
OpenProcess
LoadLibraryA
InitializeCriticalSection
GetWindowsDirectoryA
GetVersionExA
GetSystemInfo
GetSystemDirectoryA
GetShortPathNameA
GetProcAddress
GetPrivateProfileStringA
GetModuleHandleA
GetFileAttributesA
GetExitCodeThread
GetCurrentProcessId
FreeLibrary
FindNextFileA
FindFirstFileA
FindClose
ExitThread
DeleteFileA
DeleteCriticalSection
CreateProcessA
CreateFileA
CopyFileA
CompareStringA
CloseHandle
CloseHandle
GetModuleHandleA
CloseHandle
user32
GetKeyboardType
MessageBoxA
CharNextA
UnhookWindowsHookEx
ToAscii
ShowWindow
SetWindowsHookExA
SetWindowPos
SendMessageA
PtInRect
PostMessageA
LockWindowUpdate
GetWindowThreadProcessId
GetWindowTextA
GetWindowRect
GetWindow
GetMessageA
GetKeyboardState
GetForegroundWindow
GetFocus
GetDesktopWindow
GetCursorPos
GetClassNameA
GetActiveWindow
FindWindowExA
FindWindowA
CallNextHookEx
CharNextA
CallNextHookEx
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
QueryServiceStatus
OpenServiceA
OpenSCManagerA
ControlService
CloseServiceHandle
RegCloseKey
RegCloseKey
CloseServiceHandle
oleaut32
SysFreeString
SysFreeString
ws2_32
WSACleanup
WSAStartup
gethostname
gethostbyname
socket
send
inet_ntoa
htons
connect
closesocket
closesocket
wsock32
recv
wininet
InternetSetOptionA
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpSendRequestA
HttpQueryInfoA
HttpOpenRequestA
HttpOpenRequestA
Sections
PEp0 Size: 74KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PEp1 Size: 24KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE