Static task
static1
Behavioral task
behavioral1
Sample
fda297246aa93e9a366ec2177fe19ca1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fda297246aa93e9a366ec2177fe19ca1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fda297246aa93e9a366ec2177fe19ca1_JaffaCakes118
-
Size
252KB
-
MD5
fda297246aa93e9a366ec2177fe19ca1
-
SHA1
2d029a9c0e7856732ebcb996ca41ab03c2f9658b
-
SHA256
b23ccf57063950bdd860dfc8e3217dfe2c42ad29739438bdb3518a9568734dee
-
SHA512
5a46ba3892f5e5ca4dac169a9682230de26e3d549d09165e20138fd2f900dedac4197c670647aeaa4e6747bcc6164975d9cd0a46ae2f61c10894baefe61086de
-
SSDEEP
6144:Xg9SJ3GmB+gw8quOMdwD5xTse7P+BMbA5QwEgNV0gShqlHfl:KSJWmMB6OM6VxAeD+qbA5LEgNKhCHfl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fda297246aa93e9a366ec2177fe19ca1_JaffaCakes118
Files
-
fda297246aa93e9a366ec2177fe19ca1_JaffaCakes118.exe windows:4 windows x86 arch:x86
d9e532bee60319c34dd4f051b70ae406
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
htons
inet_addr
gethostname
gethostbyname
iphlpapi
GetBestInterface
GetIpAddrTable
kernel32
GetProcessHeap
TlsAlloc
InitializeCriticalSection
WaitForSingleObject
lstrcpyW
lstrlenW
GetLastError
CreateEventW
CreateMutexW
GetCurrentProcessId
FreeLibrary
GlobalAlloc
LoadLibraryW
ExpandEnvironmentStringsW
SetEvent
GetModuleHandleW
GetVersionExW
GetModuleFileNameW
ExitProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetCurrentThreadId
FatalAppExitA
HeapCreate
Sleep
GetFileAttributesW
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetCurrentThread
GetModuleHandleA
GetStartupInfoA
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
LoadLibraryA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
IsValidLocale
GetLocaleInfoW
GetVersion
GetProcAddress
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
netapi32
NetReplGetInfo
NetUseGetInfo
user32
CharNextA
GetMenuStringA
SetWindowTextA
WaitMessage
CreateDialogParamA
DialogBoxIndirectParamW
GetCapture
CreatePopupMenu
LoadBitmapA
CharNextW
SetFocus
SendMessageW
GetActiveWindow
CharLowerA
CreateWindowExW
InsertMenuItemA
GetKeyboardLayout
IsMenu
SetCursor
GetMenuItemInfoA
RegisterWindowMessageA
CharUpperW
LoadMenuA
SetCapture
CopyIcon
LoadMenuIndirectA
EmptyClipboard
SetDlgItemInt
CreateWindowExA
SetForegroundWindow
ShowWindow
DefWindowProcW
GetMenu
GetWindowRgn
TrackPopupMenu
PostQuitMessage
GetCursorPos
gdi32
GetStockObject
RemoveFontResourceW
CreateBitmap
DeleteObject
CreateFontW
CreateDIBPatternBrushPt
CreateScalableFontResourceW
Sections
.edata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.aaIrfj Size: 104KB - Virtual size: 187KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.E Size: 110KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ