Static task
static1
Behavioral task
behavioral1
Sample
df4429b1fa0d9a86299368d22dafefde_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
df4429b1fa0d9a86299368d22dafefde_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
df4429b1fa0d9a86299368d22dafefde_JaffaCakes118
-
Size
140KB
-
MD5
df4429b1fa0d9a86299368d22dafefde
-
SHA1
84c00f3409e2bff0fb51e852424e714b3b8245fe
-
SHA256
5a867769ec3f09dfa967b4058a5ed8bd9e217789ddcf8a6515b9d49cd313b9e4
-
SHA512
0c4098551ac0efe8c1e45a48cfb6f9eae0a0e6a18fee0d6b990120f459f11a769dc53b56224af8f98595b0ea6e1d3130c73c65cb6bb901324bd0360f20609883
-
SSDEEP
3072:Z8h8kNPOyAFaXXnCNlLe8cSifzVtkqw9HtSjEF3GdLE:ZGxDnSlKNSifzMqKNSjEFWdL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df4429b1fa0d9a86299368d22dafefde_JaffaCakes118
Files
-
df4429b1fa0d9a86299368d22dafefde_JaffaCakes118.exe windows:4 windows x86 arch:x86
eeea18f81f9b27413447089e76ed794f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalSize
WriteFile
SetFilePointer
lstrcatA
CreateProcessA
InitializeCriticalSection
lstrcpyA
DeleteFileA
lstrcmpiA
MapViewOfFile
CreateFileMappingA
HeapFree
UnmapViewOfFile
HeapAlloc
GetProcessHeap
VirtualProtect
IsBadReadPtr
LocalFree
GetSystemInfo
GetComputerNameA
GetVersionExA
CreateThread
OpenEventA
SetErrorMode
GetModuleFileNameA
FindClose
FindFirstFileA
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
GetStartupInfoA
GetModuleHandleA
GetFileAttributesA
CreateFileA
GetFileSize
ReadFile
lstrlenA
LocalReAlloc
LocalAlloc
GetCurrentProcessId
GetLocalTime
GetTickCount
CancelIo
InterlockedExchange
SetEvent
ResetEvent
GetLastError
WaitForSingleObject
CloseHandle
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
Sleep
VirtualFree
DeleteCriticalSection
LoadLibraryA
GetProcAddress
FreeLibrary
GetCurrentThreadId
GetStringTypeW
user32
OpenDesktopA
ExitWindowsEx
GetWindowTextA
GetThreadDesktop
wsprintfA
CloseDesktop
SetThreadDesktop
OpenInputDesktop
MessageBoxA
GetUserObjectInformationA
advapi32
InitializeSecurityDescriptor
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
FreeSid
OpenSCManagerA
DeleteService
CloseServiceHandle
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyA
msvcrt
_controlfp
__set_app_type
__p__fmode
putchar
??3@YAXPAX@Z
memcpy
__CxxFrameHandler
_CxxThrowException
memmove
ceil
_ftol
puts
strlen
strstr
memset
??2@YAPAXI@Z
memcmp
rand
strcpy
sprintf
strncpy
malloc
strcat
strrchr
atoi
strncmp
strcmp
free
strchr
_errno
_except_handler3
realloc
_beginthreadex
strncat
calloc
??1type_info@@UAE@XZ
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
ws2_32
send
inet_addr
connect
sendto
closesocket
htonl
inet_ntoa
getsockname
bind
recvfrom
__WSAFDIsSet
select
recv
socket
gethostbyname
htons
setsockopt
WSAIoctl
WSACleanup
WSAStartup
WSASocketA
shlwapi
PathRemoveFileSpecA
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ