Static task
static1
Behavioral task
behavioral1
Sample
ac04d457ff799a18895545082c88ddad_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ac04d457ff799a18895545082c88ddad_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ac04d457ff799a18895545082c88ddad_JaffaCakes118
-
Size
224KB
-
MD5
ac04d457ff799a18895545082c88ddad
-
SHA1
cf47d2805c1d8c1ba9d9b6849f75bfd4e53e163a
-
SHA256
a69a7beec97032d9a965f2373da4abe2ad13734f167419981d418ebaa747d24c
-
SHA512
79615abfb7e630734ac26d5d7428da495c79b8115c4252568b6c1748cac144e6bb7f2d8258826c21f38a31190642c33ae201ada571bbb2a4276c8e4bf990ceee
-
SSDEEP
3072:SA2/QjqQx9WrjxJk2dAOauWXAHlPng6ZMQVqEVjxdJUA8Xoct5xY:SA6WberjxJkj0WwFfgLQ/V1dOXDt5O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac04d457ff799a18895545082c88ddad_JaffaCakes118
Files
-
ac04d457ff799a18895545082c88ddad_JaffaCakes118.exe windows:4 windows x86 arch:x86
2992035ed1649922c28e5dfa8fdd917a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetGetConnectionA
mfc71
ord1617
ord3946
ord1401
ord4244
ord5152
ord1908
ord5073
ord6275
ord4185
ord3403
ord4722
ord4282
ord1600
ord5960
ord923
ord928
ord932
ord930
ord934
ord2410
ord2394
ord2413
ord2408
ord2385
ord2387
ord2405
ord2178
ord2172
ord1522
ord6279
ord3802
ord6277
ord3345
ord4967
ord1362
ord5175
ord1964
ord1656
ord1655
ord1599
ord5200
ord2537
ord2731
ord2835
ord4307
ord2715
ord2862
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4486
ord4262
ord604
ord352
ord350
ord1084
ord1903
ord2095
ord1591
ord5915
ord1620
ord1402
ord4240
ord5214
ord2714
ord2991
ord4261
ord3317
ord572
ord741
ord1793
ord1794
ord2497
ord6236
ord1412
ord6067
ord3684
ord3337
ord760
ord1161
ord709
ord501
ord1091
ord2271
ord865
ord911
ord908
ord3997
ord5529
ord4108
ord5403
ord2468
ord2292
ord1486
ord2657
ord1123
ord1065
ord1916
ord5563
ord1070
ord6180
ord2322
ord1618
ord3648
ord3466
ord4100
ord2094
ord3244
ord1955
ord2371
ord1283
ord1063
ord2372
ord1308
ord2176
ord2246
ord1913
ord2615
ord5009
ord5012
ord4309
ord4135
ord2939
ord4904
ord943
ord5356
ord2992
ord2425
ord2424
ord4019
ord1557
ord3945
ord5148
ord5205
ord2173
ord1306
ord4277
ord635
ord395
ord5165
ord5833
ord4265
ord6144
ord3401
ord782
ord4342
ord4299
ord3683
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord2063
ord2018
ord5583
ord3806
ord1207
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord3948
ord4568
ord5230
ord5213
ord5566
ord2838
ord4481
ord3333
ord566
ord757
ord6166
ord2248
ord298
ord6090
ord5975
ord1160
ord3830
ord2164
ord6167
ord2475
ord300
ord5817
ord2691
ord2818
ord6161
ord3064
ord5235
ord5233
ord2390
ord2400
ord2398
ord2396
ord2392
ord2415
ord2403
ord577
ord283
ord1230
ord5912
ord1551
ord1670
ord1671
ord2020
ord4890
ord4735
ord4212
ord5182
ord1364
ord4199
ord4670
ord3936
ord6079
ord2799
ord6087
ord3791
ord6257
ord2148
ord4367
ord4500
ord5515
ord6151
ord2680
ord2729
ord2266
ord1393
ord988
ord5392
ord3712
ord3704
ord3900
ord2642
ord1984
ord2638
ord907
ord4363
ord310
ord4035
ord2686
ord781
ord304
ord6174
ord784
ord1482
ord2933
ord299
ord1489
ord297
ord578
ord4579
ord4126
ord2131
ord5203
ord1203
ord1280
ord3163
ord1934
ord3210
ord762
ord764
ord1187
ord1191
ord3440
ord3640
ord1010
msvcr71
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
_onexit
__dllonexit
__security_error_handler
memset
_adjust_fdiv
_mbctoupper
_ismbcdigit
isleadbyte
_mbccpy
_mbsinc
_mbsdec
__p__commode
_setmbcp
__p__fmode
__set_app_type
free
_except_handler3
__CxxFrameHandler
_controlfp
_mbsrchr
kernel32
lstrlenA
GetFileAttributesA
FindClose
GetModuleFileNameA
GetDriveTypeA
FindFirstFileA
FindNextFileA
InterlockedExchange
CreateProcessA
GetTickCount
LoadLibraryA
InterlockedIncrement
InterlockedDecrement
GetProcAddress
ExitProcess
GetModuleHandleA
GetStartupInfoA
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetLocaleInfoA
GetVersionExA
GetThreadLocale
MultiByteToWideChar
WideCharToMultiByte
GetLastError
InitializeCriticalSection
DeleteCriticalSection
lstrcmpiA
user32
PostMessageA
LoadMenuA
ModifyMenuA
GetParent
SetForegroundWindow
LoadIconA
GetCursorPos
UpdateWindow
DefWindowProcA
GetSubMenu
LoadCursorA
TranslateAcceleratorA
UnregisterClassA
EnableWindow
SendMessageA
FindWindowA
PeekMessageA
gdi32
CreateSolidBrush
advapi32
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
shell32
Shell_NotifyIconA
SHGetFileInfoA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ord2
ord4
comctl32
ord17
ole32
StringFromCLSID
CoTaskMemFree
GetRunningObjectTable
CreateClassMoniker
CoUninitialize
StringFromGUID2
CoCreateInstance
FreePropVariantArray
CoInitializeEx
oleaut32
SysAllocString
VarBstrCat
VariantClear
SysAllocStringLen
SysFreeString
Sections
.text Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE