Static task
static1
Behavioral task
behavioral1
Sample
be46f6f8f554efb997a7199d49367eb7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be46f6f8f554efb997a7199d49367eb7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
be46f6f8f554efb997a7199d49367eb7_JaffaCakes118
-
Size
57KB
-
MD5
be46f6f8f554efb997a7199d49367eb7
-
SHA1
c7d3d2ccbfd27282bc801d74345734b5540bf2b8
-
SHA256
960e1c9bc1a53e067d350b22f5aed496b109ad434b44ab60450877c42edfbece
-
SHA512
ac92dfacd83e3b8cfe800ab74938736eff75cca135e96d78b76d33cdb10b4ecbc4d96f3c611c092d13c44709a65d41eed5503d10639b88379f36cb686c166c74
-
SSDEEP
768:2FrEuK3Jn8CGQyk0VJf45WM1h6AIM7e4VPTIjj4Vt0qK4ko:+DqJnQ/zVZ45z/Tew/VtKo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource be46f6f8f554efb997a7199d49367eb7_JaffaCakes118
Files
-
be46f6f8f554efb997a7199d49367eb7_JaffaCakes118.exe windows:4 windows x86 arch:x86
1da82f916ef4ade78ab5e615e1ae331e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msin32
UninstallHook
InstallHook
user32
SetTimer
SendMessageA
RegisterClassExA
PostQuitMessage
OpenClipboard
MessageBoxA
KillTimer
GetWindowTextA
GetMessageA
GetForegroundWindow
GetClipboardData
GetClassNameA
FindWindowExA
FindWindowA
DispatchMessageA
DefWindowProcA
CreateWindowExA
CloseClipboard
wsprintfA
TranslateMessage
shell32
SHGetSpecialFolderPathA
kernel32
GlobalFree
ReadFile
GlobalAlloc
lstrlenA
lstrcpynA
lstrcpyA
lstrcmpiA
lstrcmpA
lstrcatA
WriteFile
WinExec
Sleep
SetFilePointer
GetWindowsDirectoryA
Process32Next
Process32First
GlobalUnlock
CloseHandle
CompareStringA
CreateFileA
CreateThread
CreateToolhelp32Snapshot
DeleteFileA
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
GetCommandLineA
GetFileSize
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetSystemTime
GlobalLock
advapi32
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
GetUserNameA
RegOpenKeyExA
RegOpenKeyA
wsock32
send
recv
listen
inet_ntoa
inet_addr
htons
gethostbyname
connect
closesocket
WSAAsyncSelect
WSACleanup
socket
WSAStartup
bind
accept
wininet
InternetOpenUrlA
InternetOpenA
InternetGetConnectedState
InternetConnectA
InternetCloseHandle
FtpPutFileA
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
DeleteUrlCacheEntryA
InternetReadFile
urlmon
URLDownloadToFileA
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE