?DllGetVersion@@YAHPAU_DllVersionInfo@@@Z
Static task
static1
Behavioral task
behavioral1
Sample
02fa7c56e1c6c8937cc28e989dff61df_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02fa7c56e1c6c8937cc28e989dff61df_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
02fa7c56e1c6c8937cc28e989dff61df_JaffaCakes118
-
Size
3.3MB
-
MD5
02fa7c56e1c6c8937cc28e989dff61df
-
SHA1
7ed0943dbd089a7ec1b48de51adeb4d19a6573c6
-
SHA256
f4fd2333f74bb4cd29ae6d511ff0b006e5b9c9861e587956361ab751f738dd12
-
SHA512
c4631959deaaf449ac5f13a833b54cb274cf9d85a0beaf64edc43db8e23400d0f4ed6aa5ccf64a7e41a2921799616d5bd656df90f1c0259e1961e61e85adb3e7
-
SSDEEP
98304:RHgE/UsAlr7KHfOWGxrgAZtYSVdk53v6spIuoNCx/0k:nuqHGWir99496s2uoI3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02fa7c56e1c6c8937cc28e989dff61df_JaffaCakes118
Files
-
02fa7c56e1c6c8937cc28e989dff61df_JaffaCakes118.exe windows:4 windows x86 arch:x86
cf0baa24cc021ca2a96e17c12a9efb48
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
connect
WSAStartup
WSAGetLastError
htons
WSACleanup
recv
socket
gethostbyname
send
kernel32
EnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
GetCurrentProcessId
LocalFree
FindResourceA
GetLocaleInfoA
LoadResource
GlobalLock
WaitForSingleObject
GetCommandLineA
FindResourceExA
GlobalAlloc
WideCharToMultiByte
SizeofResource
CreateProcessA
GetModuleFileNameW
CompareStringW
GetACP
MultiByteToWideChar
RaiseException
InterlockedExchange
GetThreadLocale
LockResource
CompareStringA
GetVersionExA
GetLastError
SetEnvironmentVariableA
GlobalReAlloc
CreateThread
SetEndOfFile
RtlUnwind
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
FlushFileBuffers
UnhandledExceptionFilter
GetCPInfo
GetOEMCP
SetFilePointer
GetStdHandle
SetHandleCount
WriteFile
GetCurrentDirectoryA
GetDriveTypeA
ReadFile
CreateFileA
GetFileType
SetStdHandle
GetTimeZoneInformation
VirtualFree
LeaveCriticalSection
Sleep
InitializeCriticalSection
FormatMessageA
GetStringTypeA
CloseHandle
GetStringTypeW
LCMapStringA
LCMapStringW
LoadLibraryA
GetProcessHeap
HeapCreate
HeapDestroy
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
FindNextFileA
HeapFree
HeapAlloc
HeapSize
DeleteFileA
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
CreateDirectoryA
RemoveDirectoryA
GetTimeFormatA
GetDateFormatA
GetFullPathNameA
GetSystemTimeAsFileTime
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitThread
ResumeThread
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
GetStartupInfoA
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
user32
DestroyWindow
GetMessageA
SetActiveWindow
CreateDialogParamA
DdeCreateStringHandleA
DdeGetLastError
SetForegroundWindow
DdeInitializeA
GetClientRect
GetDC
TranslateMessage
GetWindowTextA
MessageBoxA
BringWindowToTop
PeekMessageA
ReleaseDC
GetDlgItem
SetWindowPos
ShowWindow
DispatchMessageA
DdeClientTransaction
DdeConnect
DdeNameService
SetWindowTextA
GetCursorPos
gdi32
DeleteObject
SelectObject
GetBkColor
CreatePen
CreateSolidBrush
Polygon
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
shell32
ShellExecuteExA
Exports
Exports
Sections
.text Size: 152KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ