Static task
static1
Behavioral task
behavioral1
Sample
d18466d36a275b1ec8356e517a6b2021_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d18466d36a275b1ec8356e517a6b2021_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d18466d36a275b1ec8356e517a6b2021_JaffaCakes118
-
Size
12KB
-
MD5
d18466d36a275b1ec8356e517a6b2021
-
SHA1
b9a1f2054804881626b6e11e4b6f40d7b88c50cf
-
SHA256
a2325aa331b6270eb819d25c1593a6d4b17ff8fd3cd7f45a01cd8db8e5f5c89f
-
SHA512
20e130a95eda93b1a639a62e91ee887ea84505e45d6bc8d73150f39d301c89655af2e584aca4ac972850f6bfdb43c296773ce98f2af696b7547a68fadd0baf28
-
SSDEEP
384:MwAuF0ti3Igru8QRC1GwJmdNTfOhfZCkmvnM:MwAuF08YJWaTcZ/UnM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d18466d36a275b1ec8356e517a6b2021_JaffaCakes118
Files
-
d18466d36a275b1ec8356e517a6b2021_JaffaCakes118.exe windows:4 windows x86 arch:x86
39173252e32aa975a1fbeb6e6df3ebc4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memcpy
strcpy
exit
toupper
_ftol
ceil
_endthread
strcmp
strncpy
atoi
strlen
_beginthread
strstr
srand
rand
??1type_info@@UAE@XZ
??3@YAXPAX@Z
_CxxThrowException
_snprintf
memset
_vsnprintf
strncat
kernel32
LocalFree
GetSystemTime
GetFileSize
lstrlenA
WriteFile
SetFilePointer
ReadFile
CloseHandle
DeleteFileA
GlobalAlloc
GlobalLock
GlobalUnlock
GetShortPathNameA
GetComputerNameA
GetLocaleInfoA
GetTickCount
Sleep
TerminateThread
ReleaseMutex
WaitForSingleObject
CreateMutexA
SetFileAttributesA
CopyFileA
GetSystemDirectoryA
GetModuleFileNameA
GetModuleHandleA
SetErrorMode
GetTempPathA
QueryPerformanceFrequency
QueryPerformanceCounter
GetVersionExA
GetFileAttributesA
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
MoveFileExA
GetEnvironmentVariableA
CreateFileA
user32
keybd_event
FindWindowA
SetFocus
ShowWindow
VkKeyScanA
CloseClipboard
OpenClipboard
EmptyClipboard
SetForegroundWindow
BlockInput
SetClipboardData
ws2_32
send
inet_addr
gethostbyname
connect
htons
socket
closesocket
WSAStartup
WSACleanup
recv
advapi32
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
shell32
ShellExecuteExA
SHChangeNotify
ShellExecuteA
urlmon
URLDownloadToFileA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
SysAllocString
VariantClear
VariantInit
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
Sections
.bss Size: - Virtual size: 33B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE