Static task
static1
Behavioral task
behavioral1
Sample
bab002dad972ded8662ebb354a0e1ce2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bab002dad972ded8662ebb354a0e1ce2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bab002dad972ded8662ebb354a0e1ce2_JaffaCakes118
-
Size
164KB
-
MD5
bab002dad972ded8662ebb354a0e1ce2
-
SHA1
80d6a68aa6eb69c8ac37a4e5a2c3b5cfc53a2882
-
SHA256
d8c36addef515d655cfa4657c6c4bf22ecec6c91e064857219eee1f5480e9a8c
-
SHA512
e7dafce2f851e9cb88303744056a79bea3a8b3e9b4cee821ded34aed5c9f9720bc899a2f5e60318298cee6f3f1eb8ef8257e2a3baf92211ae9812d044ef992ad
-
SSDEEP
3072:10Pu2N/KPc3RlSMTXv1GijGM1DtTBfNYaZ:10PZNZSMLv1hjL1DtTB1xZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bab002dad972ded8662ebb354a0e1ce2_JaffaCakes118
Files
-
bab002dad972ded8662ebb354a0e1ce2_JaffaCakes118.exe windows:4 windows x86 arch:x86
64af4678a02df56330021175f418c2b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
closesocket
gethostname
gethostbyname
socket
WSACleanup
bind
htons
sendto
WSACloseEvent
ntohs
WSAGetLastError
recvfrom
getsockname
shutdown
connect
send
WSAStartup
recv
kernel32
GetTempPathA
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
GetWindowsDirectoryA
FindClose
FindFirstFileA
CreateEventA
TerminateThread
WaitForSingleObject
GetModuleFileNameA
CreateFileA
WriteFile
ResetEvent
WaitForMultipleObjects
SetFilePointer
GetShortPathNameA
OpenProcess
CreateDirectoryA
GetFileSize
GetTickCount
SetFileAttributesA
GetFileAttributesA
ReadFile
DeleteFileA
SetEvent
OpenEventA
CloseHandle
Sleep
CreateThread
GetStartupInfoA
GetModuleHandleA
GlobalAlloc
GlobalFree
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
GetExitCodeThread
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
FindNextFileA
GetCurrentProcessId
GetLongPathNameA
GetCurrentProcess
GetVolumeInformationA
GetDriveTypeA
CreateProcessA
DuplicateHandle
CreatePipe
GetExitCodeProcess
HeapCreate
HeapDestroy
InitializeCriticalSection
HeapAlloc
HeapFree
HeapUnlock
HeapWalk
HeapLock
gdi32
CreateDCA
CreateCompatibleBitmap
GetObjectA
BitBlt
CreateCompatibleDC
SetPixel
SaveDC
GetDIBits
gdiplus
GdipLoadImageFromFile
GdipFree
GdipCloneImage
GdiplusShutdown
GdiplusStartup
GdipSaveImageToFile
GdipDisposeImage
GdipGetImageEncodersSize
GdipGetImageEncoders
GdipAlloc
mfc42
ord3663
ord3626
ord2414
ord640
ord665
ord1979
ord5186
ord354
ord5785
ord1641
ord1640
ord323
ord800
ord1601
ord537
ord3571
msvcrt
_strset
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
_strupr
__set_app_type
_except_handler3
__dllonexit
_onexit
_controlfp
strcpy
strstr
strcmp
__CxxFrameHandler
sprintf
wcscmp
free
pow
malloc
_purecall
_ftol
rand
srand
memcmp
strchr
memcpy
strlen
strrchr
_CxxThrowException
__p__fmode
memset
user32
FindWindowA
ExitWindowsEx
GetDesktopWindow
GetWindow
GetWindowThreadProcessId
GetWindowLongA
GetWindowTextA
GetMessageA
PostThreadMessageA
GetSystemMetrics
DestroyWindow
SendMessageA
IsWindow
PostMessageA
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ