Static task
static1
Behavioral task
behavioral1
Sample
ad23ebe38c169d1f1729b9ad990d5508_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ad23ebe38c169d1f1729b9ad990d5508_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ad23ebe38c169d1f1729b9ad990d5508_JaffaCakes118
-
Size
162KB
-
MD5
ad23ebe38c169d1f1729b9ad990d5508
-
SHA1
1c0584d601fb3922777c4f76f963bcc503b2f535
-
SHA256
5b0e05cb173a99d9bca1a84a6043c860a7c5b903216bd8a98973d74cf48be57f
-
SHA512
56f32d0776a60c008dda428afa96d88560d337c811341293916bce121fddb08f8705231d6dbb0bc44c16f531605156ea02fcc52a5a1e667830582507c9db2645
-
SSDEEP
3072:SCYY5GI4sq0pdF4H1ZsfI1wcCaIWdekqFEiJoFKEeB6FP7iGa:QYk9F0pqRwRseIiJ8KEeB3H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad23ebe38c169d1f1729b9ad990d5508_JaffaCakes118
Files
-
ad23ebe38c169d1f1729b9ad990d5508_JaffaCakes118.exe windows:1 windows x86 arch:x86
91afa2950fb9c03d392b295ce9394409
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
GetUserNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
user32
CharUpperBuffA
MessageBoxA
WinHelpA
kernel32
CloseHandle
CreateDirectoryA
CreateEventA
CreateFileA
CreateThread
DeleteCriticalSection
DeleteFileA
DosDateTimeToFileTime
EnterCriticalSection
ExitProcess
ExitThread
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
FlushFileBuffers
FreeConsole
FreeEnvironmentStringsA
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetCurrentDirectoryA
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetEnvironmentStrings
GetFileAttributesA
GetFileTime
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetOEMCP
GetProcAddress
GetStdHandle
GetTimeZoneInformation
GetVersionExA
GetVersion
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LocalFileTimeToFileTime
MoveFileA
MultiByteToWideChar
OutputDebugStringA
ReadConsoleInputA
ReadFile
SearchPathA
SetConsoleCtrlHandler
SetConsoleMode
SetConsoleTitleA
SetCurrentDirectoryA
SetEnvironmentVariableA
SetEnvironmentVariableW
SetEvent
SetFileAttributesA
SetFilePointer
SetFileTime
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
Sleep
SystemTimeToFileTime
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteFile
wsock32
WSAStartup
WSACleanup
gethostname
inet_addr
gethostbyname
gethostbyaddr
ioctlsocket
WSAGetLastError
send
recv
accept
select
listen
ntohs
getsockname
closesocket
bind
htonl
setsockopt
connect
socket
htons
Sections
AUTO Size: 115KB - Virtual size:
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DGROUP Size: 32KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 13KB - Virtual size:
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
TITANIC Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE