Static task
static1
Behavioral task
behavioral1
Sample
fffef563b7ffb255943d2d2c328bff70_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fffef563b7ffb255943d2d2c328bff70_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
fffef563b7ffb255943d2d2c328bff70_JaffaCakes118
-
Size
180KB
-
MD5
fffef563b7ffb255943d2d2c328bff70
-
SHA1
7210d8c037c1b28f6c2a91dc28bbe91c455e38e6
-
SHA256
6df7fabfa6989be84b664e9ff03cddd677cb91e29dc22b466da7c79975c0946a
-
SHA512
96a1b63632ea4949e3551c51ea8e93084df034caa689254333c044a862c7e05281a9b60257f6105a6233623817e4b30d81f0ec6f8ad5365ea20aceb4a01143aa
-
SSDEEP
3072:oXOcLyMRQ8azl7vzreWVVhfBaxxSMtn3s:kOcLyMRsbrxVzMqec
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fffef563b7ffb255943d2d2c328bff70_JaffaCakes118
Files
-
fffef563b7ffb255943d2d2c328bff70_JaffaCakes118.exe windows:4 windows x86 arch:x86
937cc96ef3cef8a939703679fde137e7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
GetCurrentThreadId
GetVersionExA
CloseHandle
GetCurrentProcessId
WriteFile
GetLastError
SetLastError
GetProcAddress
LoadLibraryA
GetCurrentDirectoryA
GetFileSize
lstrcmpA
SetFilePointer
Process32First
GlobalLock
OpenProcess
GlobalAlloc
TerminateThread
Sleep
CreateSemaphoreA
TerminateProcess
ReadFile
GlobalUnlock
SetCurrentDirectoryA
FindFirstFileA
SetFileAttributesA
GlobalFree
FindClose
Process32Next
FindNextFileA
CreateToolhelp32Snapshot
DeleteFileA
CreateThread
MapViewOfFile
FlushViewOfFile
CopyFileA
CreateFileMappingA
GetDiskFreeSpaceA
WideCharToMultiByte
MultiByteToWideChar
WaitForSingleObject
GetWindowsDirectoryA
CreateProcessA
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetEndOfFile
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
GetTickCount
CreateFileA
CreateDirectoryA
RaiseException
GetCurrentProcess
UnmapViewOfFile
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
RtlUnwind
HeapSize
InterlockedDecrement
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
ExitProcess
GetModuleHandleA
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetStartupInfoA
GetProcessHeap
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
user32
mouse_event
LoadCursorA
FindWindowA
UpdateWindow
IsWindowVisible
DispatchMessageA
PostMessageA
EnumChildWindows
GetCursorPos
DefWindowProcA
RegisterClassA
SetCursorPos
GetWindowTextA
TranslateMessage
IsWindowEnabled
LoadIconA
GetWindowRect
SetTimer
GetClassNameA
GetMessageA
DestroyWindow
CreateWindowExA
CreateDesktopA
CloseDesktop
SetWindowPos
ShowWindow
SetThreadDesktop
gdi32
GetStockObject
advapi32
RegCloseKey
RegOpenKeyA
RegSetValueExA
shell32
ShellExecuteA
wininet
InternetOpenUrlA
InternetCloseHandle
HttpQueryInfoA
InternetOpenA
InternetReadFile
ws2_32
send
connect
gethostbyname
closesocket
socket
recv
WSACleanup
htons
inet_addr
WSAStartup
inet_ntoa
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ