Static task
static1
Behavioral task
behavioral1
Sample
aea4ccde0fa925f8eb9f030dca80a5f3_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
aea4ccde0fa925f8eb9f030dca80a5f3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aea4ccde0fa925f8eb9f030dca80a5f3_JaffaCakes118
-
Size
144KB
-
MD5
aea4ccde0fa925f8eb9f030dca80a5f3
-
SHA1
37738ff4876b66311f12d71e670b1b25dcd0fbf2
-
SHA256
ba6641caab2e39a54f20318fc51e9203e6f3f89d3404ea1017d53cf5ebb3ea64
-
SHA512
6aca13df53df5a803d7918b9c0c0d7d509f968925514639f11dc7ec7b1bdf70a0d8a4f72b8a46bf32f379e8a53c105cf6c5596c20f7914db8cd156837e386bd0
-
SSDEEP
3072:cE8R9puaPXsYdsesgGK3AZjOrCLzqKyGKW1VHoqxq:a3SboGEAJ8GzNyGKwVHt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aea4ccde0fa925f8eb9f030dca80a5f3_JaffaCakes118
Files
-
aea4ccde0fa925f8eb9f030dca80a5f3_JaffaCakes118.exe windows:4 windows x86 arch:x86
05a60b89aa82827f95573b5d32f1811d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_itoa
_strnicmp
_CxxThrowException
??1type_info@@UAE@XZ
__CxxFrameHandler
memmove
strcpy
_rotr
_rotl
_vsnprintf
memcmp
tolower
strcmp
printf
??2@YAPAXI@Z
??3@YAXPAX@Z
vsprintf
_beginthreadex
_except_handler3
ceil
_ftol
exit
realloc
strncmp
_snprintf
strstr
sscanf
atoi
fseek
fread
fopen
fclose
fwrite
ftell
strcat
memset
clock
sprintf
strncpy
memcpy
free
malloc
strlen
_strcmpi
ws2_32
connect
__WSAFDIsSet
accept
shutdown
setsockopt
bind
send
getpeername
ioctlsocket
socket
inet_ntoa
gethostbyaddr
WSAGetLastError
getservbyport
select
closesocket
WSASetLastError
htons
gethostbyname
getsockname
inet_addr
recv
htonl
sendto
WSACleanup
recvfrom
WSAIoctl
gethostname
WSAStartup
listen
kernel32
GetVersionExA
GetLocaleInfoA
SetCurrentDirectoryA
lstrlenA
GetWindowsDirectoryA
CreateFileA
GetFileTime
SetFileTime
GetSystemDirectoryA
LoadLibraryA
GetProcAddress
ExitProcess
CopyFileA
GetLastError
WriteFile
SearchPathA
CreatePipe
GetCurrentProcess
GetComputerNameA
CreateProcessA
PeekNamedPipe
GetExitCodeProcess
ReadFile
GetModuleHandleA
GetModuleFileNameA
OpenProcess
ReadProcessMemory
Sleep
TerminateProcess
CloseHandle
SetFileAttributesA
DeleteFileA
LocalFree
CreateThread
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GlobalMemoryStatus
GetDiskFreeSpaceExA
GetDriveTypeA
GetTickCount
QueryPerformanceFrequency
QueryPerformanceCounter
IsBadCodePtr
TerminateThread
InitializeCriticalSection
GetCurrentProcessId
EnterCriticalSection
DuplicateHandle
SetErrorMode
CreateMutexA
lstrcpyA
lstrcpynA
GetEnvironmentVariableA
lstrcmpA
LeaveCriticalSection
user32
GetForegroundWindow
IsCharAlphaNumericA
wsprintfA
GetWindowTextA
FindWindowA
SendMessageA
advapi32
RegEnumValueA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
GetUserNameA
CryptReleaseContext
CryptGenRandom
CryptAcquireContextA
RegCloseKey
shell32
ShellExecuteA
oleaut32
GetErrorInfo
Sections
.text Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PEPACK!! Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nPack Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE