Static task
static1
Behavioral task
behavioral1
Sample
db0b405aa2d0101938316491d70f8d55_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db0b405aa2d0101938316491d70f8d55_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
db0b405aa2d0101938316491d70f8d55_JaffaCakes118
-
Size
764KB
-
MD5
db0b405aa2d0101938316491d70f8d55
-
SHA1
e5d5123d1260af77d262aa9d37bb46d26feeabfc
-
SHA256
b01b469c3c77179fc1af727c02a526776b200cd86e88da669bc4bad85602f403
-
SHA512
12407fb837ba220278d10ad1b34ce384acd635c67208e868893d8ccac55b19aa7a731ce1e6ff901eb4fac5654714285b914fde402faab27d847f41205f546eb7
-
SSDEEP
6144:BY8ccBkOgxLJoorx5T+MxHU/m+dXuV1w61iatweensU1/fezZXKNCFQskvLrfcU1:HaOyoo7+MD8giscsoYKncvRAUGzVFqH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db0b405aa2d0101938316491d70f8d55_JaffaCakes118
Files
-
db0b405aa2d0101938316491d70f8d55_JaffaCakes118.exe windows:4 windows x86 arch:x86
4be7c0c4228c6a294bdbe93b5e915ce1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
GetVolumeInformationA
FindClose
FindFirstFileA
FindNextFileA
SetFileTime
SystemTimeToFileTime
GetSystemTime
CopyFileA
Sleep
DeleteFileA
GetModuleFileNameA
GetModuleHandleA
GetSystemDirectoryA
lstrcatA
GetTickCount
ExitProcess
WaitForSingleObject
FreeLibrary
GetProcAddress
CreateFileA
GetPrivateProfileStringA
GetTempFileNameA
GetWindowsDirectoryA
GetLastError
CreateMutexA
InitializeCriticalSection
DeleteCriticalSection
RaiseException
SetEndOfFile
GetLocaleInfoW
GetOEMCP
SetStdHandle
ReadFile
lstrlenA
GetFileSize
CloseHandle
WriteFile
GetLocaleInfoA
GetACP
InterlockedExchange
LoadLibraryA
GetVersionExA
IsBadCodePtr
IsBadReadPtr
GetSystemInfo
VirtualProtect
GetStringTypeW
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
RtlUnwind
HeapFree
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapAlloc
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetCPInfo
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
SetFilePointer
FlushFileBuffers
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
HeapSize
VirtualQuery
GetStdHandle
UnhandledExceptionFilter
user32
UpdateWindow
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
DispatchMessageA
TranslateMessage
PeekMessageA
ShowWindow
advapi32
RegOpenKeyA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
CloseServiceHandle
QueryServiceStatus
StartServiceA
RegCreateKeyExA
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
ole32
CoInitialize
CoUninitialize
CoCreateInstance
wininet
InternetConnectA
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
HttpSendRequestA
InternetOpenA
InternetCrackUrlA
HttpOpenRequestA
Sections
.text Size: 708KB - Virtual size: 707KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE