Static task
static1
Behavioral task
behavioral1
Sample
b5ca3c3e3e5e95862d150b2924e58e4e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b5ca3c3e3e5e95862d150b2924e58e4e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b5ca3c3e3e5e95862d150b2924e58e4e_JaffaCakes118
-
Size
150KB
-
MD5
b5ca3c3e3e5e95862d150b2924e58e4e
-
SHA1
df7d6e0eaad322c16089860c38585f76df1c5fe4
-
SHA256
d2ccf905184f0978f1c097ed8c938ab2a21d64aec4b03f504b3317bdf06d5774
-
SHA512
ac1b02b829b7ae019d2c15e8afdb48ef965741c0116ffd52da897a2325dc282f0303cff552ae1561dcf4fa0598934d2021ecaefd17bc7fe46d973bd885a4a89a
-
SSDEEP
3072:DFNXpnWsoKIQuhir4fkHIICw4E3J+q+JrflnD7CP8fs:DYvVPzE57uVffs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b5ca3c3e3e5e95862d150b2924e58e4e_JaffaCakes118
Files
-
b5ca3c3e3e5e95862d150b2924e58e4e_JaffaCakes118.exe windows:4 windows x86 arch:x86
d31101394bc1c1ec2ab2f0a034bb4526
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
send
htons
setsockopt
recv
socket
select
WSAGetLastError
shutdown
ioctlsocket
closesocket
WSACleanup
gethostbyname
connect
WSAStartup
gethostname
inet_addr
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
kernel32
DeleteCriticalSection
GetPrivateProfileIntA
CreateThread
LeaveCriticalSection
EnterCriticalSection
TerminateThread
GetModuleFileNameA
GetTempPathA
GetModuleHandleA
GetCurrentDirectoryA
lstrlenA
GetLastError
DeleteFileA
ReleaseMutex
WaitForMultipleObjects
GetVersionExA
WriteFile
CopyFileA
GetUserDefaultLangID
GlobalFree
GlobalSize
GlobalUnlock
GlobalLock
GlobalAlloc
LocalFree
LocalAlloc
SetConsoleCtrlHandler
SetStdHandle
FlushFileBuffers
CompareStringA
CompareStringW
SetEnvironmentVariableA
InitializeCriticalSection
GetVersion
CreateEventA
GlobalMemoryStatus
CloseHandle
GetPrivateProfileStringA
CreateMutexA
GetTickCount
WaitForSingleObject
WinExec
SetEvent
CreateFileA
LoadLibraryA
ReadFile
SetFilePointer
GetFileSize
IsBadWritePtr
HeapCreate
HeapDestroy
VirtualFree
GetProcAddress
HeapSize
GetEnvironmentVariableA
TerminateProcess
VirtualAlloc
UnhandledExceptionFilter
GetCurrentProcess
GetOEMCP
GetACP
GetCPInfo
RemoveDirectoryA
CreateDirectoryA
ExitProcess
GetCommandLineA
GetStartupInfoA
HeapFree
HeapAlloc
GetStringTypeW
GetSystemTime
GetTimeZoneInformation
GetLocalTime
FreeEnvironmentStringsA
FreeEnvironmentStringsW
RtlUnwind
GetEnvironmentStrings
GetEnvironmentStringsW
WideCharToMultiByte
GetStdHandle
GetFileType
SetHandleCount
IsBadReadPtr
IsBadCodePtr
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
MultiByteToWideChar
GetStringTypeA
HeapReAlloc
user32
RegisterClassExA
TranslateMessage
DispatchMessageA
LoadCursorA
GetClassInfoExA
LoadIconA
DialogBoxParamA
FindWindowA
SetForegroundWindow
MessageBoxA
GetDC
EndPaint
FillRect
GetWindowRect
GetClientRect
ScreenToClient
DefWindowProcA
SetWindowTextA
ShowWindow
IsRectEmpty
PostQuitMessage
IsWindow
IntersectRect
PtInRect
SendDlgItemMessageA
SendMessageA
DrawTextA
InvalidateRect
UpdateWindow
ReleaseDC
SetDlgItemTextA
KillTimer
SetTimer
TranslateAcceleratorA
EndDialog
GetSystemMetrics
PostMessageA
GetDlgItem
DestroyWindow
MessageBoxIndirectA
LoadAcceleratorsA
EnableWindow
GetMessageA
ChangeDisplaySettingsA
EnumDisplaySettingsA
UnionRect
gdi32
CreateSolidBrush
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
SetMapMode
SetTextColor
SetBkColor
GetObjectA
SetBkMode
CreateFontIndirectA
DeleteDC
CreateDIBitmap
GetBkColor
CreateBitmap
DeleteObject
BitBlt
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
shell32
ShellExecuteExA
ole32
CoCreateGuid
Sections
.text Size: 112KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ