Static task
static1
Behavioral task
behavioral1
Sample
ff84adc6c1029882029dd780c764277b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff84adc6c1029882029dd780c764277b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ff84adc6c1029882029dd780c764277b_JaffaCakes118
-
Size
494KB
-
MD5
ff84adc6c1029882029dd780c764277b
-
SHA1
d6f336e006f72f34925b4777b76714e41d5d4012
-
SHA256
88c5e7cacc5a07ee6798391f9e944151af403e337200d61e624219476d51cfdf
-
SHA512
4fa2a79a9fca1dab02e409cfd089d1f3fb795ea543df376a6292154a3d26f8b2aed460e22d6f19e7d7c3a9663bbae3145b22ef0d9d48d4bfdc0f7bfd1795a051
-
SSDEEP
6144:fhjiAx9B/dDg+IdcNMyOxh9k54k0zkS1+E5vyGQIN7rNnIqBKhLUPiJmFzY:QA5Vc+ISNDshxk0oGroqBKhFm5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ff84adc6c1029882029dd780c764277b_JaffaCakes118
Files
-
ff84adc6c1029882029dd780c764277b_JaffaCakes118.exe windows:4 windows x86 arch:x86
4019bfc59d55bf2e1f7b1c875552336d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
AddAtomA
CloseHandle
CreateSemaphoreA
CreateToolhelp32Snapshot
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindAtomA
FindClose
FindFirstFileA
FormatMessageA
GetAtomNameA
GetComputerNameA
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetWindowsDirectoryA
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByteEx
LeaveCriticalSection
LocalFree
MultiByteToWideChar
OpenProcess
Process32First
Process32Next
ReleaseSemaphore
SetLastError
SetThreadPriority
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
msvcrt
_fdopen
_read
_write
__getmainargs
__lc_codepage
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_assert
_beginthread
_cexit
_errno
_filelengthi64
_iob
_lseeki64
_onexit
_pclose
_popen
_setmode
abort
atexit
exit
fclose
fflush
fgetpos
fgets
fopen
fputc
fread
free
fsetpos
fwrite
getc
getenv
getwc
iswctype
localeconv
malloc
memchr
memcpy
memmove
printf
putc
putchar
puts
putwc
rand
remove
setlocale
setvbuf
signal
sprintf
srand
strcmp
strcoll
strcpy
strerror
strftime
strlen
strxfrm
time
towlower
towupper
ungetc
ungetwc
wcscoll
wcsftime
wcslen
wcsxfrm
shell32
ShellExecuteExA
user32
CallNextHookEx
DispatchMessageA
GetForegroundWindow
GetKeyState
GetMessageA
GetWindowTextA
SetWindowsHookExA
TranslateMessage
UnhookWindowsHookEx
ftplib
FtpQuit
FtpConnect
FtpLogin
FtpChdir
FtpMkdir
FtpInit
FtpPut
advapi32
GetUserNameA
RegCloseKey
RegCreateKeyA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
iphlpapi
GetIpAddrTable
psapi
EnumProcesses
GetModuleBaseNameA
ws2_32
WSACleanup
WSAStartup
closesocket
connect
htons
inet_addr
inet_ntoa
send
socket
Sections
.text Size: 463KB - Virtual size: 463KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 27KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE