Static task
static1
Behavioral task
behavioral1
Sample
d4fd57f88ae60249d61f5c2a4f72de71_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4fd57f88ae60249d61f5c2a4f72de71_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4fd57f88ae60249d61f5c2a4f72de71_JaffaCakes118
-
Size
562KB
-
MD5
d4fd57f88ae60249d61f5c2a4f72de71
-
SHA1
cbaf8c4f8c3b34e011fd2e31f213b166b51e2e08
-
SHA256
9e4cc4f7809de68d66a8ffc101518e8d6a815e457afd253dd666c4d8ef3c71d7
-
SHA512
bdf0bc3421e36a7cb364d171ead6d7c616fe44e32360cdbac2339c973e5a52c2c2304ed45dab458bacb51f055698b8a6cf4ce4c13df71930c37183c0f380ff41
-
SSDEEP
12288:ho7SK6iZydDp3daB7BKrTjLwj4zgV6H34FMgF7Zk2aKNrDVCa3rLMCj:q7SKfZydDbwdi3btX1gFwCrDVD3/N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4fd57f88ae60249d61f5c2a4f72de71_JaffaCakes118
Files
-
d4fd57f88ae60249d61f5c2a4f72de71_JaffaCakes118.exe windows:5 windows x86 arch:x86
d1f9edc62b003660a8a1f89f6ed584ed
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetCloseHandle
InternetOpenA
InternetFindNextFileA
HttpOpenRequestA
InternetWriteFile
FtpFindFirstFileA
FtpOpenFileA
InternetConnectA
HttpSendRequestA
crypt32
CryptUnprotectData
msvcrt
_controlfp
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_XcptFilter
_exit
_cexit
__getmainargs
memcpy
memset
_ismbblead
realloc
_strcmpi
??2@YAPAXI@Z
getchar
_time64
fclose
fseek
ftell
strrchr
fwrite
_strdup
??3@YAXPAX@Z
_purecall
srand
rand
fread
setvbuf
fopen
printf
fgets
strncpy
tolower
atoi
memchr
strstr
rewind
strncmp
sscanf
sprintf
malloc
free
_iob
strchr
wcschr
??1type_info@@UAE@XZ
_CxxThrowException
_except_handler3
kernel32
lstrcmpA
CloseHandle
CreateFileMappingA
lstrlenA
MapViewOfFile
UnmapViewOfFile
FreeLibrary
GetProcAddress
VirtualAlloc
GetProcessHeap
HeapFree
GetCurrentThreadId
GetCurrentProcess
GetCommandLineA
WideCharToMultiByte
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
RtlUnwind
FindNextFileA
LockResource
GetPrivateProfileStringA
FindClose
FindFirstFileA
SizeofResource
LoadResource
FindResourceA
GetComputerNameA
lstrcpyA
LocalFree
FileTimeToLocalFileTime
GetModuleHandleA
GetModuleFileNameA
LoadLibraryA
lstrcatA
FileTimeToSystemTime
GetFileAttributesA
user32
wsprintfA
IsCharAlphaNumericA
advapi32
CryptEncrypt
OpenProcessToken
CryptSetKeyParam
GetTokenInformation
RegQueryValueExA
LookupAccountSidA
CryptReleaseContext
RegEnumKeyExA
CryptAcquireContextA
RegOpenKeyExA
CryptImportKey
CryptCreateHash
RegEnumValueA
CryptDestroyKey
GetUserNameA
CryptDecrypt
CryptDestroyHash
RegCloseKey
CryptHashData
CryptGenRandom
CryptGetHashParam
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ole32
CoInitialize
CoUninitialize
CoGetClassObject
oleaut32
GetErrorInfo
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 520KB - Virtual size: 519KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ