Static task
static1
Behavioral task
behavioral1
Sample
b45a8339b1bab443cf173cf160f9f8ed_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b45a8339b1bab443cf173cf160f9f8ed_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b45a8339b1bab443cf173cf160f9f8ed_JaffaCakes118
-
Size
169KB
-
MD5
b45a8339b1bab443cf173cf160f9f8ed
-
SHA1
e887c13d59ae864ea639c5c32ec2939669f9a0bb
-
SHA256
36108e286325d7de2881e8e1927c797d59ce1de691a51db793a2e2569a2deb76
-
SHA512
19ba8db90121beca015f05b1c5554297bab29f20f2b94535f8ab4d206b01d0e788df5e07de6475b6f252ea9bf9a4f8d1e626901fe6fa29bfced5f851b147aaf4
-
SSDEEP
3072:a+VqXZbcVyp/YLpbE9DgqHaSkaOlmVCiiXiv68QvXrTBfCvK:qZ+4T9c9iiXw6ZvbTBqvK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b45a8339b1bab443cf173cf160f9f8ed_JaffaCakes118
Files
-
b45a8339b1bab443cf173cf160f9f8ed_JaffaCakes118.exe windows:4 windows x86 arch:x86
476cfb8eccf9af0bfffae5b0ff53d32f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
sprintf
strcmp
strncmp
_strnicmp
strncpy
_strdup
free
memmove
memcpy
strlen
strcpy
strcat
fread
_setjmp3
fopen
fclose
localtime
mktime
gmtime
_snprintf
abort
_CIpow
_iob
fprintf
longjmp
malloc
strtod
fwrite
fflush
kernel32
GetModuleHandleA
HeapCreate
GetWindowsDirectoryA
HeapDestroy
ExitProcess
GetFullPathNameA
HeapFree
HeapAlloc
InitializeCriticalSection
LoadLibraryA
GetProcAddress
FreeLibrary
QueryPerformanceFrequency
QueryPerformanceCounter
GetModuleFileNameA
GetCurrentProcess
DuplicateHandle
CloseHandle
CreatePipe
GetStdHandle
CreateProcessA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
WriteFile
ReadFile
PeekNamedPipe
GetTickCount
Sleep
CreateFileA
CreateDirectoryA
CopyFileA
GetTempPathA
DeleteFileA
FindClose
FindFirstFileA
GetLastError
FindNextFileA
GetFileSize
GetLocalTime
GlobalAlloc
GlobalFree
HeapReAlloc
user32
GetSystemMetrics
GetDC
ReleaseDC
GetWindow
SetActiveWindow
RemovePropA
SendMessageA
DestroyWindow
UnregisterClassA
DestroyAcceleratorTable
LoadIconA
LoadCursorA
RegisterClassA
AdjustWindowRect
GetActiveWindow
GetWindowRect
CreateWindowExA
SetPropA
ShowWindow
CreateAcceleratorTableA
SetCursorPos
LoadImageA
SetCursor
GetWindowLongA
GetParent
MapWindowPoints
MoveWindow
SystemParametersInfoA
GetKeyState
SetCapture
PostMessageA
GetCursorPos
ReleaseCapture
GetPropA
GetClientRect
FillRect
EnumChildWindows
DefFrameProcA
DefWindowProcA
IsWindowEnabled
IsWindowVisible
SetFocus
GetFocus
IsChild
GetClassNameA
OffsetRect
SetRect
ClientToScreen
CallWindowProcA
SetWindowLongA
ShowCursor
InvalidateRect
BeginPaint
EndPaint
RegisterClassExA
DestroyIcon
DrawIconEx
gdi32
GetDeviceCaps
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
DeleteObject
GetStockObject
GetObjectType
GetObjectA
GetDIBits
CreateDCA
CreateCompatibleBitmap
CreateDIBSection
CreateSolidBrush
CreatePen
SetTextAlign
SetTextColor
SelectPalette
RealizePalette
SetStretchBltMode
StretchDIBits
StretchBlt
SetBkColor
SetROP2
SetBkMode
advapi32
RegOpenKeyExA
RegSetValueExA
RegCloseKey
comctl32
InitCommonControlsEx
ole32
RevokeDragDrop
shell32
ShellExecuteExA
winmm
timeEndPeriod
wsock32
gethostbyname
closesocket
WSACleanup
WSAStartup
gethostname
socket
inet_addr
htons
connect
ioctlsocket
bind
listen
accept
recvfrom
ntohs
getpeername
recv
send
sendto
WSAGetLastError
Sections
.code Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 126KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 700B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ