Static task
static1
Behavioral task
behavioral1
Sample
bc63a499d107ce3a1556c8c8c550ec89_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bc63a499d107ce3a1556c8c8c550ec89_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bc63a499d107ce3a1556c8c8c550ec89_JaffaCakes118
-
Size
61KB
-
MD5
bc63a499d107ce3a1556c8c8c550ec89
-
SHA1
f0e4fcb162c1682fe188c213a8f839bd547a9336
-
SHA256
1a879c3a322ae18e1148834b17a836777c2102a24b3c1e392db691625f2f50c7
-
SHA512
556d819df8e4d54839715278f31f40058c01984b65f3d992142c302911e5af730aefaa8d0fa1203b45ec21ff8e4c374f2d0878cbcbb38db0160c6785854bca34
-
SSDEEP
768:26p/IptHGdO/nM+QOntqrXEnpIsDi46q+iB5uTDQNsRwp3eoiL4d:2OQzms0DopdDi46qTuDAlpOoZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bc63a499d107ce3a1556c8c8c550ec89_JaffaCakes118
Files
-
bc63a499d107ce3a1556c8c8c550ec89_JaffaCakes118.exe windows:4 windows x86 arch:x86
a8b1e5f62abd0d41ad181d24ee7bbea4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
GetLastError
CopyFileA
SetFileAttributesA
GetFileAttributesA
lstrcmpiA
GetTempPathA
GetModuleFileNameA
GetModuleHandleA
CreateProcessA
ExitProcess
WriteFile
CreateFileA
ExpandEnvironmentStringsA
ExitThread
GetSystemDefaultLangID
GlobalUnlock
GlobalLock
lstrlenA
CreateDirectoryA
lstrcatA
GetDriveTypeA
GetLogicalDriveStringsA
CreateMutexA
SetErrorMode
IsBadCodePtr
SetUnhandledExceptionFilter
RaiseException
LocalFree
SetEnvironmentVariableA
CompareStringW
CompareStringA
ReadFile
SetEndOfFile
LoadLibraryA
GetProcAddress
GetOEMCP
CloseHandle
Sleep
GetVersionExA
GetLocaleInfoA
GlobalAlloc
GetTickCount
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetStdHandle
SetFilePointer
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
HeapReAlloc
VirtualAlloc
HeapFree
VirtualFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetStartupInfoA
GetCommandLineA
GetVersion
GetEnvironmentVariableA
HeapDestroy
HeapCreate
user32
BlockInput
FindWindowA
CloseClipboard
SetClipboardData
EmptyClipboard
wsprintfA
VkKeyScanA
SetFocus
GetForegroundWindow
SetForegroundWindow
keybd_event
ShowWindow
OpenClipboard
advapi32
RegDeleteKeyA
RegCreateKeyA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegOpenKeyA
shell32
ShellExecuteA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
oleaut32
VariantInit
SysAllocString
VariantClear
ws2_32
WSACleanup
sendto
ioctlsocket
recv
select
gethostbyname
inet_addr
closesocket
WSAStartup
connect
socket
htons
send
shlwapi
PathRemoveFileSpecA
urlmon
URLDownloadToFileA
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE