Static task
static1
Behavioral task
behavioral1
Sample
fc23a1b90312fffefac51803e46b767b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc23a1b90312fffefac51803e46b767b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fc23a1b90312fffefac51803e46b767b_JaffaCakes118
-
Size
189KB
-
MD5
fc23a1b90312fffefac51803e46b767b
-
SHA1
b82a196ad4fc0eb66a02fe3ced2988ca4f0e613f
-
SHA256
7c20a16ebf183e9bb5a0630c3a5209727bc42ab8bf12948565a26ce6ca0312d3
-
SHA512
9d3a9ba565e2bf7b84d99bddd7778fa7544a205fa0e9a441a4b4bd70e7c41465141673bc6d6cfc777f2f7a0c3516d68ba7d0d5c37f8b5a22ee6aaed1cb03c84a
-
SSDEEP
3072:kG1HM8qM3wSMu50Ab6K6M4Z2j85SOtZNEU/99IkhkxatTBfunXbI:kG1lmumA76fJoOtZ7/9WkixatTB2XbI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fc23a1b90312fffefac51803e46b767b_JaffaCakes118
Files
-
fc23a1b90312fffefac51803e46b767b_JaffaCakes118.exe windows:4 windows x86 arch:x86
9b46ff72d03c8157da5d6a8ba3d29ddf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
EnumProcessModules
GetModuleFileNameExA
kernel32
FindFirstFileA
GetFileSize
CreateEventA
TerminateThread
WaitForSingleObject
CreateThread
WriteFile
ResetEvent
WaitForMultipleObjects
ReadFile
FindClose
GetVolumeInformationA
FindNextFileA
Process32Next
Process32First
CreateToolhelp32Snapshot
SetFileAttributesA
GetFileAttributesA
GetLongPathNameA
OpenProcess
GetModuleFileNameA
LoadLibraryA
GetProcAddress
Sleep
GetTempPathA
GetDriveTypeA
CreateFileA
DeleteFileA
SetEvent
OpenEventA
CloseHandle
GetTickCount
GetExitCodeThread
GetStartupInfoA
GetModuleHandleA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
GetCurrentProcessId
GetCurrentProcess
SetFilePointer
CreateDirectoryA
CreateProcessA
DuplicateHandle
CreatePipe
GetExitCodeProcess
CreateIoCompletionPort
PostQueuedCompletionStatus
GetQueuedCompletionStatus
InitializeCriticalSection
gdi32
EnumFontsA
SelectObject
CreatePen
SetBkMode
GetCharABCWidthsA
GetCurrentObject
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
shell32
ShellExecuteA
SHFileOperationA
msvcrt
pow
_exit
_XcptFilter
exit
_acmdln
_strlwr
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
__dllonexit
_onexit
??1type_info@@UAE@XZ
_controlfp
strlen
strchr
strcmp
_purecall
_CxxThrowException
strcpy
memset
_ftol
strrchr
sprintf
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
memcmp
__getmainargs
ws2_32
gethostname
closesocket
WSAIoctl
socket
bind
htons
sendto
WSAStartup
WSAGetLastError
recvfrom
getsockname
shutdown
connect
send
gethostbyname
ntohs
WSACleanup
recv
user32
PostMessageA
ExitWindowsEx
FindWindowA
GetWindow
GetWindowThreadProcessId
GetWindowLongA
GetWindowTextA
GetMessageA
PostThreadMessageA
GetDesktopWindow
ole32
CoCreateGuid
CoUninitialize
CoInitialize
winmm
timeSetEvent
timeKillEvent
Sections
.text Size: 140KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 592B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ