Static task
static1
Behavioral task
behavioral1
Sample
d24c212d80db53d5e56101aab5336a0a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d24c212d80db53d5e56101aab5336a0a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d24c212d80db53d5e56101aab5336a0a_JaffaCakes118
-
Size
52KB
-
MD5
d24c212d80db53d5e56101aab5336a0a
-
SHA1
f8345023df6ca87a23a1c8ad5d8158a62043d393
-
SHA256
5f58e60d70595fa58a3a85e62d5d9eb21a7fcce81bee2bbc8c13953a9165d08b
-
SHA512
cd94ded8f7c4243989d6808726cf302b9c097b914baf4f2b41dad0fcc02819a67fe79dfc6c9a026d07888508f921cc4d5ee3b3ac229c6560a61f91eda74917bf
-
SSDEEP
768:IRpGFcoZssTZr1DXNrYU7hQnrEcrJbiBwAqGzB9ZuAHAiGQ4DLC9Y:IGcodFFNrYUZc1GBwA7TZuAHA5DLC9Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d24c212d80db53d5e56101aab5336a0a_JaffaCakes118
Files
-
d24c212d80db53d5e56101aab5336a0a_JaffaCakes118.exe windows:4 windows x86 arch:x86
93fa19d6b9300976f08a43a3c6977e4a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
urlmon
URLDownloadToFileA
kernel32
WaitForSingleObject
CreateProcessA
ExpandEnvironmentStringsA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LoadLibraryA
CloseHandle
GetCurrentProcess
ExitThread
ReleaseMutex
GetTickCount
CreateMutexA
GetLocaleInfoA
GetVersionExA
GetFileAttributesA
CopyFileA
SetFileAttributesA
GetWindowsDirectoryA
WriteFile
CreateFileA
lstrlenA
CreateDirectoryA
lstrcatA
GetDriveTypeA
lstrcmpiA
GlobalFree
GlobalAlloc
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SetFilePointer
GetFileSize
FindClose
FindNextFileA
GetFullPathNameA
SetCurrentDirectoryA
FindFirstFileA
GlobalUnlock
GlobalLock
InterlockedDecrement
ReadFile
GetSystemTime
TerminateThread
ExitProcess
CreateThread
LocalFree
WideCharToMultiByte
GetStartupInfoA
GetLastError
GetTempPathA
Sleep
GetLogicalDriveStringsA
user32
BringWindowToTop
EnumWindows
keybd_event
ShowWindow
IsWindow
SetFocus
SetForegroundWindow
FindWindowA
GetWindowTextA
CharLowerA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
BlockInput
VkKeyScanA
msvcrt
wcslen
_CxxThrowException
strcpy
_controlfp
strstr
strlen
??1type_info@@UAE@XZ
strchr
sprintf
rand
memset
_snprintf
memcmp
strncpy
srand
strtok
strcmp
_vsnprintf
??2@YAPAXI@Z
memcpy
strcat
free
malloc
_except_handler3
__CxxFrameHandler
atoi
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
advapi32
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyExA
GetUserNameA
ws2_32
closesocket
connect
ioctlsocket
socket
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
VariantClear
SysFreeString
SysAllocString
VariantInit
Sections
.text Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 277KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE