Static task
static1
Behavioral task
behavioral1
Sample
c84e8628022759ed6da731cd602e79d7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c84e8628022759ed6da731cd602e79d7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c84e8628022759ed6da731cd602e79d7_JaffaCakes118
-
Size
92KB
-
MD5
c84e8628022759ed6da731cd602e79d7
-
SHA1
274d698e376a37c6348503f412b2d7fc786f6793
-
SHA256
f9d55c762bd11eb5e3c4170cf0e64182d870a1028f1cd7559f286a708a04c8af
-
SHA512
b210a503ab738d68bef4f7aa78ea997258b170b4b2c1a48a3463da632e3b459b420bff9dff33132b5f6b0f921ebbf8131742a8332ac1e9e1fbc2f827ea917c9a
-
SSDEEP
1536:bay0ZomDRLBNzQsht+bBMyOMDcFx8ywwPG7S7eUYRoJJ7SiPMMm:OoG7ZL+bBoqkuwPGieUYRoJLPMMm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c84e8628022759ed6da731cd602e79d7_JaffaCakes118
Files
-
c84e8628022759ed6da731cd602e79d7_JaffaCakes118.exe windows:4 windows x86 arch:x86
4bdab3b8dfd4d6ffcaa49168afb5fd95
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
ExitThread
GlobalUnlock
GlobalLock
SetFilePointer
GetFileSize
ReadFile
GetLastError
Beep
GetDriveTypeA
GetLogicalDriveStringsA
GetVolumeInformationA
SetErrorMode
lstrcmpA
GetStringTypeA
LCMapStringW
LCMapStringA
LoadLibraryA
GetProcAddress
GetOEMCP
GetACP
lstrcmpiA
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetVersion
GetCommandLineA
FindNextFileA
FindClose
CreateProcessA
WaitForSingleObject
ExitProcess
GetLocalTime
DeleteFileA
MultiByteToWideChar
GetEnvironmentVariableA
GetModuleFileNameA
CreateDirectoryA
CreateFileA
WriteFile
CloseHandle
Sleep
CreateThread
GetTickCount
lstrlenA
GetCPInfo
GetStartupInfoA
GetModuleHandleA
HeapAlloc
HeapFree
GetStringTypeW
user32
MessageBoxA
RegisterClassA
LoadCursorA
LoadIconA
UpdateWindow
ShowWindow
CreateWindowExA
DefWindowProcA
GetForegroundWindow
CloseClipboard
GetClipboardData
OpenClipboard
GetAsyncKeyState
UnhookWindowsHookEx
SetWindowsHookExA
DispatchMessageA
TranslateMessage
GetWindowTextA
EnumChildWindows
PostQuitMessage
GetWindowThreadProcessId
GetKeyboardLayout
GetKeyState
EmptyClipboard
CallNextHookEx
SendMessageA
GetClassNameA
GetMessageA
gdi32
CreateDCA
CreateCompatibleDC
CreateDIBSection
DeleteDC
SaveDC
SelectObject
BitBlt
RestoreDC
DeleteObject
GetDeviceCaps
advapi32
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumValueA
RegEnumKeyExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
oleaut32
SysAllocStringLen
SysFreeString
ws2_32
closesocket
send
connect
htons
gethostbyname
socket
WSACleanup
WSAStartup
recv
gdiplus
GdipSaveImageToFile
GdipGetImageEncoders
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdiplusShutdown
GdiplusStartup
GdipFree
GdipDisposeImage
GdipCloneImage
GdipGetImageEncodersSize
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ