Static task
static1
Behavioral task
behavioral1
Sample
c808f47ea29e7460a84a31183ab020ba_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c808f47ea29e7460a84a31183ab020ba_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c808f47ea29e7460a84a31183ab020ba_JaffaCakes118
-
Size
200KB
-
MD5
c808f47ea29e7460a84a31183ab020ba
-
SHA1
7f21a408ed4258a6399ce62ccf4caf3089604876
-
SHA256
d61cd21ad058fc48e3d1dcd28d1146a8f8f3ec1450466003d6e0a6cacff0f083
-
SHA512
18ff9cb42a069ac4c2071083c7ae051c17bcf5b7b5cdbf81d9477d8513fc6cbaa90667ddda855e33abfba41f28786a52d82f31384b982aec23ebf586931ca163
-
SSDEEP
3072:lOD1RApSjBmrxef1y25OITHUqH7Bt0oICJwnykRzDfPKH:45SSFmt2h/7BOVCSRDn6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c808f47ea29e7460a84a31183ab020ba_JaffaCakes118
Files
-
c808f47ea29e7460a84a31183ab020ba_JaffaCakes118.exe windows:1 windows x86 arch:x86
b3cb8b6ad9e76c49b222e2c0021950bc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memcpy
_wchdir
_wcsupr
_controlfp
_ismbcalnum
putwc
_acmdln
_get_heap_handle
wcscat
strstr
mbstowcs
__p__commode
_lfind
exit
_mbctombb
_mbsnbcat
_finite
_wcmdln
is_wctype
_spawnlp
strcpy
_strncoll
_initterm
wcscmp
_toupper
tolower
_chdir
_wcsset
_strtime
_exit
_except_handler3
_wgetdcwd
_adj_fprem1
_mkdir
_assert
__setusermatherr
_wspawnlp
_spawnvp
_execv
_putch
_seh_longjmp_unwind
fread
_rmdir
toupper
_getmbcp
strtol
towupper
_onexit
_mbsncat
_adjust_fdiv
_findclose
atof
_setmbcp
wcstod
_wmkdir
_wfreopen
_mbsnbcmp
abs
_mbsnbcpy
_cgets
__p__fmode
_wstati64
_wsopen
__set_app_type
_wtol
__getmainargs
perror
atol
_cwprintf
_ismbcalpha
fgets
_wfindnext64
_wfsopen
_wspawnlpe
_XcptFilter
kernel32
FreeLibrary
FlushFileBuffers
FileTimeToSystemTime
QueryPerformanceFrequency
MulDiv
GetStringTypeA
GetProcessHeap
FormatMessageA
SearchPathA
GetACP
GetDriveTypeA
TlsAlloc
ExitThread
SetHandleCount
GetThreadContext
SetProcessWorkingSetSize
FindFirstFileA
GetLastError
VirtualFree
IsValidCodePage
TerminateThread
ReadFile
GetModuleHandleW
Sleep
SetLastError
GetFileTime
IsBadStringPtrA
CreateProcessA
UnhandledExceptionFilter
TlsFree
GetLocaleInfoA
EnterCriticalSection
InterlockedDecrement
FileTimeToLocalFileTime
RaiseException
lstrlenA
GetComputerNameW
DeleteFileA
GlobalReAlloc
DeviceIoControl
GetSystemInfo
IsDebuggerPresent
SetStdHandle
UnmapViewOfFile
IsBadReadPtr
MultiByteToWideChar
CloseHandle
DeleteCriticalSection
RtlUnwind
CreateToolhelp32Snapshot
CreateFileMappingA
WriteConsoleW
DuplicateHandle
GetModuleFileNameA
HeapFree
SetFilePointer
GetModuleHandleA
GetTickCount
SetPriorityClass
HeapAlloc
ResumeThread
QueryPerformanceCounter
GetVersion
GlobalAddAtomA
GetStartupInfoA
OpenEventA
GetConsoleOutputCP
user32
ClientToScreen
CheckMenuRadioItem
PostQuitMessage
OpenClipboard
GetWindowThreadProcessId
SetCursor
TranslateMessage
GetSystemMetrics
SetScrollInfo
DeferWindowPos
GetWindowPlacement
SetWindowPlacement
CreateMenu
GetMenuItemCount
DestroyWindow
GetWindowRect
RemoveMenu
IsDlgButtonChecked
GetWindowDC
LoadCursorA
GetDlgItemTextA
GetClientRect
CheckRadioButton
ScreenToClient
ReleaseDC
SystemParametersInfoA
ScrollWindowEx
TrackPopupMenu
FindWindowExA
CreateDialogParamA
IsWindowVisible
UpdateWindow
SetWindowLongA
LoadImageA
GetKeyState
LoadMenuA
GetWindowTextA
CreateIconIndirect
GetSysColor
MoveWindow
CreatePopupMenu
DefMDIChildProcA
GetMenuItemID
IsIconic
DialogBoxParamA
CreateWindowExA
LoadAcceleratorsA
FillRect
SetDlgItemTextA
CloseClipboard
CheckDlgButton
MapWindowPoints
Sections
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 179KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ