Static task
static1
Behavioral task
behavioral1
Sample
e9e88cd749618d7ba7fba99aac9bd79b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9e88cd749618d7ba7fba99aac9bd79b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e9e88cd749618d7ba7fba99aac9bd79b_JaffaCakes118
-
Size
47KB
-
MD5
e9e88cd749618d7ba7fba99aac9bd79b
-
SHA1
8e48c19ad2ba93c55d7f3ada4ca6942f435bcf27
-
SHA256
3fa1b33d423fef6e768885336de75b3617203822745bb4616f137611aad7e8a1
-
SHA512
075159e7fc4ecee30a26bb72492a0a56aad4b28cbb2ca277cea95d31492c6c9480f2ef0ff66952e10f10c7519ffb4a6f5f7d15b2aab1392525b962e5925a465b
-
SSDEEP
768:UHCYTDXCrlL+naZW+AsQDXpg/9R0+DPCd6/ER:UHCY3XalL1yDXpg/f0Auv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e9e88cd749618d7ba7fba99aac9bd79b_JaffaCakes118
Files
-
e9e88cd749618d7ba7fba99aac9bd79b_JaffaCakes118.exe windows:1 windows x86 arch:x86
738798224c5aa106ad5f610405deddf7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
WritePrivateProfileStringA
_lwrite
FindNextFileA
WideCharToMultiByte
GetDriveTypeA
Sleep
GlobalAlloc
GetModuleHandleA
ExitProcess
WriteConsoleA
CreateFileA
WinExec
lstrlenA
FindFirstFileA
GetSystemDirectoryA
CreateDirectoryA
GetProcAddress
SetCurrentDirectoryA
_lclose
GlobalFree
CreateThread
GetCurrentDirectoryA
SetFilePointer
GetFileSize
FindClose
GetLogicalDriveStringsA
CloseHandle
GetModuleFileNameA
lstrcpyA
lstrcmpA
GlobalAddAtomA
GlobalFindAtomA
LoadLibraryA
GetWindowsDirectoryA
CopyFileA
GetStdHandle
WriteFile
SetFileAttributesA
lstrcatA
RemoveDirectoryA
DeleteFileA
ReadFile
_lcreat
advapi32
RegSetValueExA
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
RegCloseKey
wsock32
closesocket
bind
accept
__WSAFDIsSet
WSAStartup
WSACleanup
select
socket
setsockopt
send
recv
listen
connect
inet_ntoa
inet_addr
htons
gethostname
gethostbyname
wininet
InternetOpenUrlA
InternetReadFile
FtpPutFileA
InternetOpenA
InternetGetConnectedState
InternetCloseHandle
InternetConnectA
gdi32
SelectObject
GetDeviceCaps
GetDIBColorTable
DeleteObject
DeleteDC
CreateDIBSection
CreateDCA
CreateCompatibleDC
BitBlt
user32
TranslateMessage
ToAsciiEx
SetWindowsHookExA
SetClipboardViewer
SendMessageA
RegisterClassA
PeekMessageA
OpenClipboard
GetWindowThreadProcessId
GetWindowTextA
GetMessageA
GetKeyboardState
GetKeyboardLayout
GetKeyNameTextA
GetForegroundWindow
GetFocus
GetClipboardData
DispatchMessageA
SetKeyboardState
DefWindowProcA
CreateWindowExA
CloseClipboard
CallNextHookEx
Sections
Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE