Static task
static1
Behavioral task
behavioral1
Sample
b41dd0b07d4f181c26607132f27871a1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b41dd0b07d4f181c26607132f27871a1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b41dd0b07d4f181c26607132f27871a1_JaffaCakes118
-
Size
55KB
-
MD5
b41dd0b07d4f181c26607132f27871a1
-
SHA1
0c5071b507345e3ce8a3589313cafff53a04086f
-
SHA256
1d3322d09b0673ee5a68818e5a185760bcc25a4f4219bc0762d33534d4c5bfc5
-
SHA512
38af3906f6c86b357bd8c3eebf2a70338487792db63586c362bb4e09e6c6f56ea6e5df05340ff01f11ece03abec908890a459de300953c089abb8fa5d0e06bac
-
SSDEEP
768:YNmRPPAsAdbK18CGQyk0VJf45WM1h6AIM7e4VPTIjj4Vt0qK4ko9M:0mRwkQ/zVZ45z/Tew/VtKo9M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b41dd0b07d4f181c26607132f27871a1_JaffaCakes118
Files
-
b41dd0b07d4f181c26607132f27871a1_JaffaCakes118.exe windows:4 windows x86 arch:x86
fbf8db57afb268593f34dcb5dc6ae107
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msin32
UninstallHook
InstallHook
user32
SetTimer
SendMessageA
RegisterClassExA
PostQuitMessage
OpenClipboard
KillTimer
GetWindowTextA
GetMessageA
TranslateMessage
GetClipboardData
GetClassNameA
FindWindowExA
FindWindowA
DispatchMessageA
DefWindowProcA
CreateWindowExA
CloseClipboard
wsprintfA
GetForegroundWindow
kernel32
GlobalUnlock
SetFilePointer
GlobalLock
lstrlenA
lstrcpynA
lstrcpyA
lstrcmpiA
lstrcmpA
lstrcatA
WriteFile
WinExec
Sleep
GlobalFree
ReadFile
Process32Next
CloseHandle
CompareStringA
CreateFileA
CreateThread
CreateToolhelp32Snapshot
DeleteFileA
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
GetCommandLineA
GetFileSize
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetSystemTime
GetWindowsDirectoryA
GlobalAlloc
Process32First
advapi32
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
GetUserNameA
RegOpenKeyA
wsock32
send
recv
listen
inet_ntoa
inet_addr
htons
gethostbyname
connect
closesocket
WSACleanup
accept
socket
WSAStartup
WSAAsyncSelect
bind
wininet
InternetOpenUrlA
InternetOpenA
InternetGetConnectedState
InternetConnectA
InternetCloseHandle
FtpPutFileA
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
DeleteUrlCacheEntryA
InternetReadFile
urlmon
URLDownloadToFileA
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE