Static task
static1
Behavioral task
behavioral1
Sample
d446d076f328dba4622c340ff8c2148f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d446d076f328dba4622c340ff8c2148f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d446d076f328dba4622c340ff8c2148f_JaffaCakes118
-
Size
40KB
-
MD5
d446d076f328dba4622c340ff8c2148f
-
SHA1
6e1f89aa54ec60cfb76e69563ad53915f152f377
-
SHA256
d84f13738e4aafd08677f5908f7451e570b6c489e7da6e61be62cb76c3d3db03
-
SHA512
3dd93231df8d616b95c54f9483c2e7e3ba0f8adf4ff21453b8763469a31b20e16e05b2b946d5ac573a22fa575023459531aceb8855f439a4d808b9853d348ee0
-
SSDEEP
384:bhHYxVvA7KKCqK+VZfsqRoTGdubx2JqbYxOhpm56OovKVNhrHmLF59Wbx3QW:bhHyA7KKCq7ZEV6jJWpm5ymjwux3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d446d076f328dba4622c340ff8c2148f_JaffaCakes118
Files
-
d446d076f328dba4622c340ff8c2148f_JaffaCakes118.exe windows:4 windows x86 arch:x86
23e1aab1996f0f2dc1a8bb4124fb64af
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoW
GetTimeZoneInformation
GetLocalTime
GlobalAlloc
GetCurrentProcess
GetLastError
GetCurrentThread
GlobalFree
GetModuleFileNameW
WaitForMultipleObjects
SetErrorMode
Sleep
GetVersionExW
CreateFileW
CreateWaitableTimerW
CancelWaitableTimer
CreateEventW
ExitThread
GetTickCount
SizeofResource
LoadResource
FindResourceExW
GetModuleHandleW
GetTempPathW
GetCurrentThreadId
GetTempFileNameW
GetStartupInfoW
WriteFile
CreateProcessW
CloseHandle
LoadLibraryW
SetWaitableTimer
GetProcAddress
SearchPathA
GetShortPathNameA
GetFullPathNameA
SetCurrentDirectoryA
GetFileAttributesA
SetFileAttributesA
CreateFileA
GetFileSize
ExitProcess
GetTempPathA
GetCommandLineA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
CreateThread
CreateProcessA
RemoveDirectoryA
lstrlenA
GetSystemDirectoryA
GetVersion
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
WaitForSingleObject
GetExitCodeProcess
LoadLibraryExA
FreeLibrary
WritePrivateProfileStringA
GetPrivateProfileStringA
SetFilePointer
FindClose
FindFirstFileA
DeleteFileA
user32
GetKeyboardLayoutList
PostQuitMessage
DispatchMessageW
TranslateMessage
GetMessageW
PostThreadMessageW
PeekMessageW
advapi32
GetTokenInformation
OpenProcessToken
OpenThreadToken
AllocateAndInitializeSid
EqualSid
wininet
InternetOpenW
InternetCrackUrlW
InternetCloseHandle
InternetReadFile
HttpQueryInfoW
HttpSendRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetConnectW
iphlpapi
GetAdaptersInfo
ws2_32
inet_addr
WSACleanup
WSAStartup
gethostbyname
dnsapi
DnsRecordListFree
DnsNameCompare_W
msvcrt
swscanf
strtok
sscanf
??3@YAXPAX@Z
_controlfp
_except_handler3
__set_app_type
??2@YAPAXI@Z
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
_XcptFilter
_exit
time
_wstrtime
_wstrdate
exit
malloc
wcslen
free
swprintf
wcscmp
_beginthreadex
realloc
wcsncpy
wcscat
wcscpy
_wstat
mbstowcs
wcstombs
_c_exit
toupper
fprintf
isdigit
isxdigit
islower
__getmainargs
snmpapi
SnmpUtilVarBindFree
SnmpUtilMemAlloc
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ