Static task
static1
Behavioral task
behavioral1
Sample
e270097d072600980d0e85ba06f8ee28_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e270097d072600980d0e85ba06f8ee28_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e270097d072600980d0e85ba06f8ee28_JaffaCakes118
-
Size
244KB
-
MD5
e270097d072600980d0e85ba06f8ee28
-
SHA1
4fae8029c72ee4f34be077dec7de2f8813fbfcc9
-
SHA256
071a85fad7dbbe7158a82e46ec9c622b8fbb0da12512ab732d808740dd77a2d0
-
SHA512
b6e79d58e9c9f341b36015c4a35242547b7fc6f7920a9f15b2ac7ac193b5879ac87468c1639d838a497df30682258571f69fb829959269d1f4294e0a0d65ac51
-
SSDEEP
3072:UV7W6KZkcL2bc1qILEzgMdXPxwHyBEocuTc7BT0kGSMPCL3FDv:C7ckcaoshgsPSyBFclBT0kGkL3FD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e270097d072600980d0e85ba06f8ee28_JaffaCakes118
Files
-
e270097d072600980d0e85ba06f8ee28_JaffaCakes118.exe windows:4 windows x86 arch:x86
f602533faadea8ed9434f57facc63b8c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetCheckConnectionA
mfc71
ord1054
ord3830
ord556
ord744
ord265
ord266
ord785
ord3255
ord782
ord865
ord5331
ord6297
ord6205
ord548
ord673
ord6200
ord4042
ord438
ord762
ord1084
ord442
ord378
ord3787
ord1003
ord5445
ord2274
ord723
ord531
ord6173
ord1024
ord3389
ord5323
ord2903
ord1465
ord5420
ord3457
ord2702
ord379
ord3295
ord530
ord722
ord6005
ord5714
ord5320
ord6286
ord3458
ord2471
ord2308
ord914
ord6210
ord4055
ord5877
ord2120
ord2750
ord2753
ord2746
ord3094
ord6135
ord5490
ord4083
ord1207
ord384
ord5484
ord629
ord1263
ord907
ord6138
ord4108
ord4081
ord3931
ord5563
ord1486
ord2271
ord2322
ord557
ord745
ord2272
ord4109
ord4085
ord386
ord2280
ord2288
ord2751
ord2748
ord911
ord1440
ord631
ord2469
ord5097
ord6310
ord6168
ord5491
ord6288
ord5089
ord764
ord304
ord4035
ord2475
ord1482
ord2933
ord299
ord1489
ord1151
ord5529
ord3997
ord781
ord421
ord2783
ord655
ord5781
ord2743
ord1443
ord1917
ord2468
ord5403
ord297
ord1452
ord1439
ord566
ord757
ord3333
ord4261
ord4481
ord3949
ord2644
ord3709
ord3719
ord3718
ord2533
ord2646
ord2540
ord2838
ord2714
ord4307
ord2835
ord2731
ord2537
ord5566
ord5213
ord5230
ord4568
ord3948
ord2248
ord5226
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord5918
ord380
ord310
ord784
ord578
ord3201
ord2703
ord5493
ord5715
ord5716
ord1185
ord6006
ord1187
ord1191
ord3683
ord6013
msvcr71
_setmbcp
_controlfp
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
__security_error_handler
memset
calloc
srand
rand
_getcwd
_chdir
_splitpath
memmove
_unlink
_mbsnbicmp
atof
atoi
_time64
_CxxThrowException
strftime
__CxxFrameHandler
_localtime64
_mktime64
_except_handler3
free
time
kernel32
lstrlenA
DeleteCriticalSection
InitializeCriticalSection
GetLastError
GetVersionExA
MapViewOfFile
OpenFileMappingA
CreateFileMappingA
GetCommandLineA
GetDriveTypeA
GetDiskFreeSpaceA
SetVolumeLabelA
SetFilePointer
ExitProcess
GetStartupInfoA
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
FreeLibrary
GetProcAddress
LoadLibraryA
Sleep
GetTickCount
CloseHandle
LocalFree
LocalAlloc
OpenProcess
GetCurrentProcessId
OutputDebugStringA
SetFileAttributesA
GetSystemDirectoryA
CreateFileA
CreateDirectoryA
DeleteFileA
RemoveDirectoryA
WritePrivateProfileStringA
GetPrivateProfileStringA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetTempPathA
GetEnvironmentVariableA
GetFileAttributesA
GetPrivateProfileIntA
WaitForSingleObject
CreateEventA
TerminateProcess
GetCurrentProcess
GetLongPathNameA
CopyFileA
GetWindowsDirectoryA
GetSystemInfo
GetModuleHandleA
GetComputerNameA
SetEvent
UnmapViewOfFile
PulseEvent
user32
CharToOemBuffA
OemToCharBuffA
SetForegroundWindow
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
CloseWindowStation
OpenDesktopA
CloseDesktop
advapi32
LookupAccountSidA
RegSaveKeyA
RegEnumKeyA
RegGetKeySecurity
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetKeySecurity
RegRestoreKeyA
RegEnumKeyExA
RegQueryInfoKeyA
RegEnumValueA
RegCreateKeyExA
RegDeleteKeyA
LookupPrivilegeValueA
AdjustTokenPrivileges
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
RegCloseKey
ImpersonateLoggedOnUser
CreateProcessAsUserA
RevertToSelf
RegOpenKeyA
RegDeleteValueA
SetServiceStatus
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
OpenSCManagerA
OpenServiceA
CloseServiceHandle
DeleteService
QueryServiceStatus
ControlService
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
shell32
ShellExecuteA
comctl32
ord17
shlwapi
PathIsDirectoryA
oleaut32
VarUdateFromDate
SystemTimeToVariantTime
VariantTimeToSystemTime
msvcp71
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
msvcirt
??_Dfstream@@QAEXXZ
??1fstream@@UAE@XZ
?close@fstream@@QAEXXZ
?flush@ostream@@QAEAAV1@XZ
?write@ostream@@QAEAAV1@PBDH@Z
?get@istream@@QAEHXZ
?setmode@filebuf@@QAEHH@Z
?binary@filebuf@@2HB
??0fstream@@QAE@PBDHH@Z
?openprot@filebuf@@2HB
??1ios@@UAE@XZ
Sections
.text Size: 188KB - Virtual size: 185KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 912B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ