Static task
static1
Behavioral task
behavioral1
Sample
bbc33fd3261fa5f584dedacc805111fd_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bbc33fd3261fa5f584dedacc805111fd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bbc33fd3261fa5f584dedacc805111fd_JaffaCakes118
-
Size
100KB
-
MD5
bbc33fd3261fa5f584dedacc805111fd
-
SHA1
9afcc4f5c5a5c4a9c652b7d67aed083bcfa4a860
-
SHA256
692c31d872ddd638465900e7ad8bca4ac6b14aedd5af28022fbbb5bda4172f74
-
SHA512
48cae75ec0f8ac08ba5a6aea55e4fbc9d64329c5bc87326162da36b2bb500337a38f34de661cc5c57d5313c83d2a0384f0fa2dcd997504d1a86eeaf8712cca5f
-
SSDEEP
1536:hBh+I7KbZiqFf1hE/fcGNqKA1nVQcHOH:hBsDdnhYcGN0nq0u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bbc33fd3261fa5f584dedacc805111fd_JaffaCakes118
Files
-
bbc33fd3261fa5f584dedacc805111fd_JaffaCakes118.exe windows:4 windows x86 arch:x86
f56398200e030b1e9736ea81b1c18c1c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord2446
ord5261
ord5277
ord4627
ord4425
ord1727
ord2124
ord3597
ord4234
ord5953
ord4710
ord939
ord924
ord941
ord536
ord324
ord2725
ord2818
ord3337
ord3811
ord6055
ord1776
ord5290
ord3742
ord567
ord818
ord4275
ord1233
ord755
ord470
ord3663
ord4278
ord3922
ord2763
ord5440
ord6383
ord5450
ord4129
ord1842
ord4242
ord2723
ord2390
ord3059
ord5100
ord5103
ord4467
ord4303
ord3350
ord5012
ord975
ord5472
ord3403
ord2879
ord2878
ord4151
ord4077
ord5237
ord5282
ord2649
ord1665
ord4436
ord807
ord796
ord674
ord554
ord529
ord366
ord6394
ord2627
ord2626
ord6000
ord2117
ord4163
ord6625
ord4457
ord5252
ord5981
ord3749
ord5065
ord1168
ord2379
ord2764
ord2289
ord2370
ord791
ord523
ord2029
ord2077
ord5710
ord2820
ord922
ord926
ord1871
ord1146
ord4220
ord2584
ord3654
ord2863
ord2438
ord1644
ord2740
ord2801
ord5308
ord4779
ord5811
ord5482
ord2032
ord4411
ord4447
ord4863
ord4975
ord4274
ord5797
ord5479
ord1995
ord967
ord3717
ord4335
ord6571
ord879
ord882
ord2841
ord2107
ord603
ord1567
ord273
ord268
ord524
ord957
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord5731
ord2512
ord2554
ord4486
ord6375
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord2514
ord4998
ord4853
ord4376
ord5265
ord1200
ord535
ord3522
ord858
ord2915
ord860
ord1247
ord2621
ord6117
ord823
ord537
ord6403
ord641
ord825
ord561
ord540
ord815
ord800
ord3738
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord4427
ord6402
ord2494
ord4919
ord1576
msvcrt
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
realloc
_ftol
strchr
strncpy
atof
clock
_fcloseall
sprintf
fprintf
fread
malloc
rand
srand
time
__CxxFrameHandler
atoi
_mbscmp
free
fclose
fwrite
_controlfp
ftell
fseek
fopen
strncmp
sscanf
_purecall
strrchr
_setmbcp
kernel32
GlobalMemoryStatus
lstrcpyA
GetCurrentProcess
SetPriorityClass
CreateThread
SetThreadPriority
LoadLibraryA
FreeLibrary
DeleteFileA
CreateMutexA
GetLastError
GetDriveTypeA
CreateFileA
GetFileSize
ReadFile
CloseHandle
WriteFile
GetModuleHandleA
GetProcAddress
GetCurrentProcessId
GetModuleFileNameA
GetSystemDirectoryA
lstrcatA
lstrlenA
lstrcpynA
GetFullPathNameA
lstrcmpiA
CopyFileA
Sleep
GetWindowsDirectoryA
GetVersionExA
GetComputerNameA
GetThreadPriority
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentThread
LocalFree
LocalAlloc
TerminateProcess
OpenProcess
CreateProcessA
FindClose
FindNextFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
lstrcmpA
MoveFileA
GetFileAttributesA
CreateDirectoryA
SetFileAttributesA
GetStartupInfoA
GetDiskFreeSpaceA
user32
wsprintfA
keybd_event
ExitWindowsEx
LoadMenuA
GetSubMenu
SetMenuDefaultItem
SetForegroundWindow
GetDC
mouse_event
GetMenuItemID
SendMessageA
LoadCursorA
EnableWindow
SetWindowsHookExA
UnhookWindowsHookEx
KillTimer
TrackPopupMenu
PostMessageA
GetDesktopWindow
SetTimer
MessageBoxA
GetCursorPos
gdi32
GetDeviceCaps
GetObjectA
GetDIBits
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
advapi32
RegConnectRegistryA
GetUserNameA
RegOpenKeyExA
RegCreateKeyA
RegEnumValueA
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
shell32
SHFileOperationA
ShellExecuteA
Shell_NotifyIconA
wsock32
closesocket
accept
setsockopt
bind
htons
htonl
WSAGetLastError
socket
WSAStartup
inet_addr
recv
select
send
shutdown
listen
gethostname
gethostbyname
Sections
.text Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ