Static task
static1
Behavioral task
behavioral1
Sample
c017b232b4d2328a60398b8b2b3fb02e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c017b232b4d2328a60398b8b2b3fb02e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c017b232b4d2328a60398b8b2b3fb02e_JaffaCakes118
-
Size
244KB
-
MD5
c017b232b4d2328a60398b8b2b3fb02e
-
SHA1
a34ca0eac02e23e9ef5fb21c839f4466408dd7d1
-
SHA256
558d803f8fa8ca706c99d8adec576d42dd2461dbc4fd0b92302b2a3e3789fc60
-
SHA512
67d1fa5485bfd8b1e0b4ec2d3d064938a6265c64d3974bddbd333eabe7ed73293a788b549b708b2dd5ea7fbb90327f9370c2d2d8798f296f1a06b12a1e7affbf
-
SSDEEP
768:v7Zx6fSQxRZ5lloX/cVdqT6ygJdJ6e3jmKHPUOZb11dYZsyn2NM/3IjXY233333/:vetWX/cV5HJ6e3jmKHJJI/iXYauW2O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c017b232b4d2328a60398b8b2b3fb02e_JaffaCakes118
Files
-
c017b232b4d2328a60398b8b2b3fb02e_JaffaCakes118.exe windows:4 windows x86 arch:x86
8ba699d039bd896037f91a8c2e52a8aa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
sprintf
fabs
ceil
malloc
floor
free
fclose
memmove
strlen
strcpy
strcat
memcpy
strncpy
localtime
mktime
_strnicmp
gmtime
kernel32
GetModuleHandleA
HeapCreate
CreateSemaphoreA
GetLastError
HeapDestroy
ExitProcess
GetComputerNameA
CloseHandle
HeapAlloc
HeapFree
InitializeCriticalSection
TlsAlloc
LoadLibraryA
GetProcAddress
FreeLibrary
GetVersionExA
GetEnvironmentVariableA
SetEnvironmentVariableA
GetCurrentProcess
DuplicateHandle
CreatePipe
GetStdHandle
CreateProcessA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
Sleep
WideCharToMultiByte
GetDriveTypeA
FindFirstFileA
FindClose
GetFileAttributesA
DeleteFileA
WriteFile
CreateFileA
GetFileSize
SetFilePointer
HeapReAlloc
GetLocalTime
ReadFile
comctl32
InitCommonControls
InitCommonControlsEx
user32
DestroyWindow
GetWindow
SetActiveWindow
RemovePropA
SendMessageA
UnregisterClassA
DestroyAcceleratorTable
LoadIconA
LoadCursorA
SetCursorPos
LoadImageA
SetCursor
GetWindowLongA
GetParent
MapWindowPoints
MoveWindow
SystemParametersInfoA
GetWindowRect
GetSystemMetrics
GetKeyState
SetCapture
PostMessageA
GetCursorPos
ReleaseCapture
DestroyIcon
FillRect
CharUpperA
gdi32
DeleteObject
GetStockObject
GetObjectType
GetObjectA
CreateCompatibleDC
GetDIBits
DeleteDC
CreateDIBSection
SelectObject
BitBlt
CreateBitmap
SetPixel
advapi32
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptDeriveKey
CryptEncrypt
CryptDestroyKey
CryptDestroyHash
CryptReleaseContext
shell32
IsUserAnAdmin
ShellExecuteExA
ole32
RevokeDragDrop
CoInitialize
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
wsock32
closesocket
WSACleanup
WSAStartup
socket
inet_addr
gethostbyname
htons
connect
ioctlsocket
send
sendto
winmm
timeBeginPeriod
timeEndPeriod
Sections
.code Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 338B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ