Static task
static1
Behavioral task
behavioral1
Sample
b684f86763e7fcea1f8c4ec1cc8557f5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b684f86763e7fcea1f8c4ec1cc8557f5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b684f86763e7fcea1f8c4ec1cc8557f5_JaffaCakes118
-
Size
168KB
-
MD5
b684f86763e7fcea1f8c4ec1cc8557f5
-
SHA1
bd2ab732ec8f9b6f1ef6e427429a98d6de828791
-
SHA256
df6ecc2a7d92e35ef21514c26f8b51b7c44f4dd53ddcaada14ea31fa0e82f54d
-
SHA512
6aaca726b5dbcb09ef59ba1d0270ecd50fa13b8e67a7d17eb39e324063f5c1a1d3791b11635e55e563be1e39ed7fac5815b3713f1a899567c63c96c86861caf2
-
SSDEEP
3072:ryf6Ri0+xY/ODzbCEHaURUFrw1KFcc0ILp6a:c6Ri0+q/QSvUOFrWAcc0IL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b684f86763e7fcea1f8c4ec1cc8557f5_JaffaCakes118
Files
-
b684f86763e7fcea1f8c4ec1cc8557f5_JaffaCakes118.exe windows:4 windows x86 arch:x86
5c8e8e8b1bf1da2d0f3a5696679cbcc3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42d
ord1344
ord4191
ord1830
ord1631
ord4205
ord3786
ord3658
ord1952
ord1228
ord2875
ord317
ord1857
ord3524
ord3432
ord1087
ord4676
ord684
ord880
ord4064
ord3355
ord3447
ord492
ord3070
ord4053
ord3960
ord646
ord1906
ord3201
ord5072
ord2324
ord454
ord4475
ord2993
ord413
ord3365
ord3002
ord721
ord5078
ord1566
ord2076
ord3670
ord3944
ord3069
ord1310
ord2078
ord4208
ord3618
ord5076
ord4118
ord1781
ord4176
ord3651
ord1364
ord3362
ord4753
ord3831
ord4017
ord3948
ord3629
ord4195
ord574
ord2052
ord1862
ord706
ord728
ord528
ord2986
ord4492
ord1285
ord2021
ord3657
ord3784
ord3367
ord2431
ord3142
ord3144
ord3143
ord2339
ord2432
ord2341
ord2585
ord2473
ord3691
ord2584
ord2481
ord2340
ord4408
ord4215
ord4239
ord3826
ord3366
ord2104
ord4229
ord4227
ord2661
ord1789
ord4130
ord1033
ord3231
ord4415
ord1860
ord1880
ord3702
ord5077
ord3552
ord3803
ord711
ord1212
msvcrtd
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
_initterm
_controlfp
__dllonexit
??1type_info@@UAE@XZ
calloc
_beginthreadex
strncmp
sprintf
rand
atoi
exit
free
realloc
_except_handler3
malloc
memcmp
strcat
strcpy
printf
strlen
memset
memcpy
_ftol
memmove
__CxxFrameHandler
_CxxThrowException
kernel32
SetFilePointer
WriteFile
CloseHandle
Sleep
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CreateEventA
LoadLibraryA
GetProcAddress
CreateFileA
GetModuleFileNameA
CreateThread
MoveFileExA
MoveFileA
GetCurrentThreadId
CopyFileA
lstrcmpiA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetStartupInfoA
GetFileSize
ReadFile
GetWindowsDirectoryA
VirtualAlloc
GetFileAttributesA
CreateProcessA
lstrlenA
lstrcpyA
TerminateThread
lstrcatA
GetTickCount
DeleteFileA
GetLastError
GetCurrentProcess
HeapAlloc
GetModuleHandleA
GetDiskFreeSpaceExA
GetDriveTypeA
GlobalMemoryStatusEx
GetSystemInfo
GetVersionExA
OpenEventA
ExitProcess
CreateMutexA
user32
SetThreadDesktop
CloseDesktop
LoadIconA
LoadCursorA
RegisterClassA
PostThreadMessageA
GetInputState
GetUserObjectInformationA
OpenDesktopA
GetWindow
FindWindowA
FindWindowExA
SendMessageA
GetDlgCtrlID
PostMessageA
SendInput
GetThreadDesktop
GetMessageA
OpenInputDesktop
wsprintfA
ShowWindow
GetSystemMetrics
gdi32
GetStockObject
advapi32
CloseEventLog
OpenSCManagerA
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegCreateKeyExA
StartServiceCtrlDispatcherA
RegOpenKeyExA
CloseServiceHandle
StartServiceA
OpenServiceA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ws2_32
htons
gethostbyname
socket
gethostname
getsockname
connect
send
WSAStartup
recv
select
setsockopt
closesocket
WSACleanup
mfco42d
ord798
ole32
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
SysFreeString
iphlpapi
GetIfTable
wininet
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ