Static task
static1
Behavioral task
behavioral1
Sample
b16c14e2089a08086f1c1eaf7bded78e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b16c14e2089a08086f1c1eaf7bded78e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b16c14e2089a08086f1c1eaf7bded78e_JaffaCakes118
-
Size
344KB
-
MD5
b16c14e2089a08086f1c1eaf7bded78e
-
SHA1
546b3162a31c58a0ed99682c303ff9d16a439333
-
SHA256
a2165ed23c9bb162853a06f6893985bf458f361f61f4150eafbee6e31ac0d414
-
SHA512
562ad6d67a997a6988ef5159a22bf0f3241c02ad4acf501ecb579c26864938bd70e4a1c2aa177cd13fa4dfbf6e91a7a261e1a615875c05bcf97e1c8adb107574
-
SSDEEP
3072:TLEcuAOBL+GDQBAbCni83uqkKS/CF342yvomF3/aSbHtTBf/sXZJlG4l:ULt+GDQBxu3N1voG3/aOHtTBnsJNl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b16c14e2089a08086f1c1eaf7bded78e_JaffaCakes118
Files
-
b16c14e2089a08086f1c1eaf7bded78e_JaffaCakes118.exe windows:4 windows x86 arch:x86
289ae25288d2f44ed2e7f0a474ec83f6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenEventA
SetEvent
DeleteFileA
ReadFile
CreateFileA
GetTempPathA
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
GetWindowsDirectoryA
FindClose
FindFirstFileA
CreateEventA
TerminateThread
CloseHandle
GetModuleFileNameA
CreateThread
WriteFile
ResetEvent
WaitForMultipleObjects
SetFilePointer
GetShortPathNameA
OpenProcess
CreateDirectoryA
GetFileSize
GetTickCount
SetFileAttributesA
GetFileAttributesA
GetStringTypeW
MultiByteToWideChar
AddAtomA
GetStringTypeA
Beep
CancelIo
CompareFileTime
DeleteAtom
EnterCriticalSection
FatalAppExitA
WaitForSingleObject
Sleep
GetStartupInfoA
GetModuleHandleA
GlobalAlloc
GlobalFree
GetQueuedCompletionStatus
PostQueuedCompletionStatus
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
FindNextFileA
GetCurrentProcessId
GetLongPathNameA
GetVolumeInformationA
GetDriveTypeA
CreateProcessA
DuplicateHandle
GetExitCodeThread
GetCurrentProcess
CreatePipe
GetExitCodeProcess
HeapCreate
HeapDestroy
HeapAlloc
HeapFree
HeapUnlock
HeapWalk
HeapLock
CreateIoCompletionPort
advapi32
RegCloseKey
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumValueA
shell32
ShellExecuteA
SHFileOperationA
gdiplus
GdipLoadImageFromFile
GdipSaveImageToFile
GdipDisposeImage
GdipGetImageEncodersSize
GdipGetImageEncoders
GdipAlloc
GdipCloneImage
GdiplusShutdown
GdiplusStartup
GdipFree
mfc42
ord1641
ord3663
ord3626
ord2414
ord640
ord665
ord1979
ord5186
ord354
ord5785
ord1640
ord323
ord800
ord1601
ord537
ord3571
msvcrt
_strset
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
_strupr
__set_app_type
_except_handler3
__dllonexit
_onexit
_controlfp
strcpy
strstr
strcmp
__CxxFrameHandler
sprintf
wcscmp
free
pow
malloc
_purecall
_ftol
rand
srand
memcmp
strchr
memcpy
strlen
strrchr
_CxxThrowException
__p__fmode
memset
ws2_32
WSAStartup
WSACleanup
recv
send
connect
gethostbyname
gethostname
closesocket
WSAIoctl
socket
bind
htons
sendto
ntohs
WSAGetLastError
recvfrom
getsockname
shutdown
user32
GetWindowLongA
GetWindowTextA
GetMessageA
IsWindow
SendMessageA
DestroyWindow
GetSystemMetrics
FindWindowA
PostMessageA
GetDesktopWindow
GetWindow
GetWindowThreadProcessId
PostThreadMessageA
gdi32
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
CreateDCA
GetDIBits
GetObjectA
ole32
CoCreateGuid
CoUninitialize
StringFromGUID2
CoInitialize
winmm
timeKillEvent
timeSetEvent
Sections
.text Size: 296KB - Virtual size: 293KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ