Static task
static1
Behavioral task
behavioral1
Sample
f99174bac7db72f20dba3f8e11248539_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f99174bac7db72f20dba3f8e11248539_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f99174bac7db72f20dba3f8e11248539_JaffaCakes118
-
Size
92KB
-
MD5
f99174bac7db72f20dba3f8e11248539
-
SHA1
b36c7a67725771e9c3592962eef7f790f2e5b219
-
SHA256
526bdd9ae689097b9e6673fd120ac5257c7df5c270ffce88aa01b0c2a43261b2
-
SHA512
1f5bad38dd857242c1f766f0668042c595cd35dd34b8a97bcaf0490a254f29d9a99f5e74022aa1efccc2fce24800efa1c9eed15da13324acc5dea2a3862abb2f
-
SSDEEP
768:p2shyVluN3VDlwnFUDzqfATP8d3itKMzLtLfZMGh9/LohSb1228nU5n6llFosrz+:8shyVEV1tcGh9DohSb1mUYRosrzj6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f99174bac7db72f20dba3f8e11248539_JaffaCakes118
Files
-
f99174bac7db72f20dba3f8e11248539_JaffaCakes118.exe windows:4 windows x86 arch:x86
57e908b7fa0ef68f0145e4f6d84990b3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalUnlock
GlobalLock
DeleteFileA
RemoveDirectoryA
SetFilePointer
GetFileSize
ReadFile
GetLastError
Beep
GetDriveTypeA
GetLogicalDriveStringsA
GetVolumeInformationA
SetErrorMode
lstrcmpA
GetStringTypeA
LCMapStringW
LCMapStringA
LoadLibraryA
GetProcAddress
GetOEMCP
GetACP
ExitThread
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetVersion
GetCommandLineA
lstrcmpiA
FindFirstFileA
CopyFileA
FindNextFileA
FindClose
ExitProcess
GetLocalTime
MultiByteToWideChar
GetModuleFileNameA
GetEnvironmentVariableA
CreateDirectoryA
CreateFileA
WriteFile
CloseHandle
Sleep
CreateThread
GetTickCount
lstrlenA
GetCPInfo
GetStartupInfoA
GetModuleHandleA
HeapAlloc
HeapFree
GetStringTypeW
user32
MessageBoxA
RegisterClassA
LoadCursorA
LoadIconA
UpdateWindow
ShowWindow
CreateWindowExA
DefWindowProcA
GetForegroundWindow
CloseClipboard
GetClipboardData
OpenClipboard
GetAsyncKeyState
UnhookWindowsHookEx
SetWindowsHookExA
DispatchMessageA
TranslateMessage
GetWindowTextA
EnumChildWindows
PostQuitMessage
GetWindowThreadProcessId
GetKeyboardLayout
GetKeyState
EmptyClipboard
CallNextHookEx
SendMessageA
GetClassNameA
GetMessageA
gdi32
CreateDCA
CreateCompatibleDC
CreateDIBSection
DeleteDC
SaveDC
SelectObject
BitBlt
RestoreDC
DeleteObject
GetDeviceCaps
advapi32
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumValueA
RegEnumKeyExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
oleaut32
SysAllocStringLen
SysFreeString
ws2_32
closesocket
send
connect
htons
gethostbyname
socket
WSACleanup
WSAStartup
recv
gdiplus
GdipSaveImageToFile
GdipGetImageEncoders
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdiplusShutdown
GdiplusStartup
GdipFree
GdipDisposeImage
GdipCloneImage
GdipGetImageEncodersSize
Sections
.text Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ