Static task
static1
Behavioral task
behavioral1
Sample
bef891b9bd2dbcf51416b230dacc86b7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bef891b9bd2dbcf51416b230dacc86b7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bef891b9bd2dbcf51416b230dacc86b7_JaffaCakes118
-
Size
143KB
-
MD5
bef891b9bd2dbcf51416b230dacc86b7
-
SHA1
d838c4614b1a8736255988acdd60a4220576a665
-
SHA256
0eafaf1949eefdeae36a84cc7fa87e50bedcb0d4d7da824819efbef3f201d106
-
SHA512
2599a6bcdabfa441d686fd5429b34a698d073e54eda797576f5ccdc4fbd8a7197e9a23f52713d31ac4621523a40ec762a6f3af1bb1f50d9596b4b22eb32afefe
-
SSDEEP
3072:Z3jLOESK7aHTfaP6xBX/iU9Xni1xSMtn3M:Z3jymi1x5/X9XiOe8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bef891b9bd2dbcf51416b230dacc86b7_JaffaCakes118
Files
-
bef891b9bd2dbcf51416b230dacc86b7_JaffaCakes118.exe windows:4 windows x86 arch:x86
937cc96ef3cef8a939703679fde137e7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
GetCurrentThreadId
GetVersionExA
CloseHandle
GetCurrentProcessId
WriteFile
GetLastError
SetLastError
GetProcAddress
LoadLibraryA
GetCurrentDirectoryA
GetFileSize
lstrcmpA
SetFilePointer
Process32First
GlobalLock
OpenProcess
GlobalAlloc
TerminateThread
Sleep
CreateSemaphoreA
TerminateProcess
ReadFile
GlobalUnlock
SetCurrentDirectoryA
FindFirstFileA
SetFileAttributesA
GlobalFree
FindClose
Process32Next
FindNextFileA
CreateToolhelp32Snapshot
DeleteFileA
CreateThread
MapViewOfFile
FlushViewOfFile
CopyFileA
CreateFileMappingA
GetDiskFreeSpaceA
WideCharToMultiByte
MultiByteToWideChar
WaitForSingleObject
GetWindowsDirectoryA
CreateProcessA
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetEndOfFile
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
GetTickCount
CreateFileA
CreateDirectoryA
RaiseException
GetCurrentProcess
UnmapViewOfFile
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
RtlUnwind
HeapSize
InterlockedDecrement
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
ExitProcess
GetModuleHandleA
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetStartupInfoA
GetProcessHeap
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
user32
mouse_event
LoadCursorA
FindWindowA
UpdateWindow
IsWindowVisible
DispatchMessageA
PostMessageA
EnumChildWindows
GetCursorPos
DefWindowProcA
RegisterClassA
SetCursorPos
GetWindowTextA
TranslateMessage
IsWindowEnabled
LoadIconA
GetWindowRect
SetTimer
GetClassNameA
GetMessageA
DestroyWindow
CreateWindowExA
CreateDesktopA
CloseDesktop
SetWindowPos
ShowWindow
SetThreadDesktop
gdi32
GetStockObject
advapi32
RegCloseKey
RegOpenKeyA
RegSetValueExA
shell32
ShellExecuteA
wininet
InternetOpenUrlA
InternetCloseHandle
HttpQueryInfoA
InternetOpenA
InternetReadFile
ws2_32
send
connect
gethostbyname
closesocket
socket
recv
WSACleanup
htons
inet_addr
WSAStartup
inet_ntoa
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ