Static task
static1
Behavioral task
behavioral1
Sample
b7d108f21ceb5f7da00caaca26698241_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b7d108f21ceb5f7da00caaca26698241_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b7d108f21ceb5f7da00caaca26698241_JaffaCakes118
-
Size
43KB
-
MD5
b7d108f21ceb5f7da00caaca26698241
-
SHA1
e2d82a0ec7ba498d68a032085d7ad353fb960bca
-
SHA256
0097b53740b18f2f50c4842ecd2c3126e7d392da23b47f0885670a6c79aebd85
-
SHA512
ba9fc1e1e4efa07d93403decaf91c7227c53e860a6336713a4fdec3fec7dbc8af1165b7b61e890b4950f3ecb73f5e328029d79db3c929422a30077f85ad4d2a0
-
SSDEEP
768:KvwhhBFRNDY8keUilWtwWs1rsLwivsr7BhJv+lUqJXGDNmHMDAoKGdp:3dRNDY8kMRWs1rsdm9hZ+ljMcoK+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7d108f21ceb5f7da00caaca26698241_JaffaCakes118
Files
-
b7d108f21ceb5f7da00caaca26698241_JaffaCakes118.exe windows:4 windows x86 arch:x86
9c982dd12a09862ba692952e8dcbf355
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
closesocket
connect
socket
htons
send
select
inet_addr
gethostbyname
WSAStartup
recv
WSACleanup
shell32
ShellExecuteA
advapi32
RegSetValueExA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
kernel32
LocalFree
FlushFileBuffers
SetStdHandle
RaiseException
GetProcAddress
GetOEMCP
GetFileType
GetStdHandle
SetUnhandledExceptionFilter
IsBadCodePtr
LoadLibraryA
GetTempPathA
HeapDestroy
HeapCreate
GetLocaleInfoA
CreateThread
ExitProcess
lstrlenA
Sleep
GetTickCount
ExitThread
SetFileAttributesA
CopyFileA
CreateDirectoryA
GetFileAttributesA
ExpandEnvironmentStringsA
GetModuleFileNameA
GetModuleHandleA
GetLastError
CreateMutexA
GetSystemDefaultLangID
GlobalUnlock
GlobalLock
GlobalAlloc
WaitForSingleObject
HeapFree
HeapAlloc
DeleteFileA
CloseHandle
ReadFile
GetFileSize
CreateFileA
GetSystemDirectoryA
MultiByteToWideChar
FindClose
FindNextFileA
FindFirstFileA
GetDriveTypeA
GetLogicalDriveStringsA
GetComputerNameA
GetVersionExA
Process32Next
Process32First
CreateToolhelp32Snapshot
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
RtlUnwind
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapReAlloc
VirtualAlloc
VirtualFree
LCMapStringW
LCMapStringA
WideCharToMultiByte
GetVersion
GetCommandLineA
GetStartupInfoA
WriteFile
SetFilePointer
GetStringTypeA
GetStringTypeW
GetCPInfo
GetACP
user32
CreateWindowExA
GetMessageA
DispatchMessageA
TranslateMessage
DestroyWindow
IsWindow
GetForegroundWindow
MapVirtualKeyA
GetWindowThreadProcessId
EnumWindows
GetClassNameA
LoadCursorA
RegisterClassA
PostQuitMessage
DefWindowProcA
GetSystemMetrics
IsWindowVisible
SendMessageA
FindWindowExA
PostMessageA
BlockInput
keybd_event
SetForegroundWindow
SetFocus
ShowWindow
VkKeyScanA
OpenClipboard
EmptyClipboard
CloseClipboard
wsprintfA
FindWindowA
GetMenuItemID
SetClipboardData
urlmon
URLDownloadToFileA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
VariantClear
SysAllocString
VariantInit
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE