Static task
static1
Behavioral task
behavioral1
Sample
b816177b947654b8ee49e705d0c98cb7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b816177b947654b8ee49e705d0c98cb7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b816177b947654b8ee49e705d0c98cb7_JaffaCakes118
-
Size
120KB
-
MD5
b816177b947654b8ee49e705d0c98cb7
-
SHA1
98293410b62a49a494adefe28595cdd41a5b6a9b
-
SHA256
f3a6898d58dfe38f391c1ca0e4d296b05d3714e9bf1b74a55f1475c6be742dcb
-
SHA512
604ae99c1aa243efc6a0112f54248ccf85bb716e15224e765c9c0aeaf779c2c3329d394b2fd87420083b2945d5568ec5ec4a6c0ea4eedf8da63a1abe2e4970d8
-
SSDEEP
3072:Dva8kddXOcKhIAsdxn6sM0TZMl9VJdzh5vaBAzmeu2ZNG:ja8KXObhIAsdxn6sM0TZMl9VJdzh5var
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b816177b947654b8ee49e705d0c98cb7_JaffaCakes118
Files
-
b816177b947654b8ee49e705d0c98cb7_JaffaCakes118.exe .js windows:4 windows x86 arch:x86 polyglot
038449cd6a3355416de250abcd0a1128
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
GetSystemDirectoryA
lstrlenA
GetVersionExA
SetFileAttributesA
CreateFileA
MultiByteToWideChar
GetStartupInfoA
FindFirstFileA
FindNextFileA
DeleteFileA
FindClose
CreateDirectoryA
CopyFileA
GetModuleHandleA
GetModuleFileNameA
CloseHandle
MoveFileA
Sleep
GetCurrentDirectoryA
WriteFile
user32
GetWindowRect
GetWindow
GetClassNameA
LoadIconA
IsWindowVisible
GetIconInfo
GetDesktopWindow
ShowCursor
mouse_event
SetForegroundWindow
SetActiveWindow
GetCursorPos
SetCursorPos
gdi32
CreateCompatibleDC
GetDIBits
DeleteDC
DeleteObject
GetObjectA
advapi32
RegDeleteValueA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
msvcrt
_stricmp
_controlfp
_except_handler3
??3@YAXPAX@Z
_beginthread
??2@YAPAXI@Z
__CxxFrameHandler
sprintf
strrchr
fclose
fprintf
fopen
strstr
free
malloc
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Xlen@std@@YAXXZ
?max_size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0_Winit@std@@QAE@XZ
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
netapi32
Netbios
Sections
.text Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ