Static task
static1
Behavioral task
behavioral1
Sample
102bccb77181d99bba08efb19488c234_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
102bccb77181d99bba08efb19488c234_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
102bccb77181d99bba08efb19488c234_JaffaCakes118
-
Size
744KB
-
MD5
102bccb77181d99bba08efb19488c234
-
SHA1
8776006328ecbcc86c75170bcc4b8984815f1d8f
-
SHA256
c46d67eb3be44675d01d9875908538d3e4e677930ddd112f631e1d3246eaf435
-
SHA512
664f52870adf09a7213f36d6094bc85ddb8a3de9453f97bab3c7886fa2a21f3f6c455722fca806b96027de57473e097e612dab1d77a841ba8cc122af77e24ad3
-
SSDEEP
12288:648zOdc+uryAjvSy/pRr+T2Z/rPWBoimkEL743avJYLqlM5LdwMCHDfo:648zOdF6vSy/pRr+T2Z/rioiHEL7439s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 102bccb77181d99bba08efb19488c234_JaffaCakes118
Files
-
102bccb77181d99bba08efb19488c234_JaffaCakes118.exe windows:4 windows x86 arch:x86
6829501acafef27cb65a3b5a521626a0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetReadFile
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
kernel32
TerminateThread
LoadLibraryA
WideCharToMultiByte
ResetEvent
lstrcpyA
InterlockedExchange
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
lstrcmpA
GetPrivateProfileStringA
DeleteFileA
GetFileAttributesA
CreateProcessA
GetDriveTypeA
GetLogicalDriveStringsA
FindClose
LocalFree
FindFirstFileA
LocalAlloc
MoveFileA
GetVersion
DeviceIoControl
Sleep
MultiByteToWideChar
HeapFree
HeapAlloc
GetProcessHeap
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetModuleHandleA
GetModuleFileNameA
ReadFile
CloseHandle
GetStartupInfoA
OpenProcess
LCMapStringW
LCMapStringA
SetFilePointer
FlushFileBuffers
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
InterlockedIncrement
InterlockedDecrement
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
WriteFile
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapSize
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetProcAddress
RaiseException
SetLastError
TlsAlloc
GetCommandLineA
ExitThread
TlsGetValue
TlsSetValue
GetCurrentThreadId
CreateThread
GetLastError
GetCurrentProcess
RtlUnwind
ExitProcess
TerminateProcess
user32
IsWindow
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
LoadIconA
RegisterClassExA
DefWindowProcA
GetCursorInfo
GetCursorPos
ReleaseDC
GetDesktopWindow
GetDC
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
SetCursorPos
WindowFromPoint
SetCapture
mouse_event
MapVirtualKeyA
keybd_event
SystemParametersInfoA
BlockInput
DestroyCursor
LoadCursorA
GetKeyState
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
ExitWindowsEx
MessageBoxA
CharNextA
wsprintfA
EndDialog
CreateDialogParamA
UpdateWindow
ShowWindow
SetWindowPos
TranslateMessage
GetDlgItem
SendMessageA
GetClientRect
CloseWindow
CreateWindowExA
GetMessageA
DispatchMessageA
SetRect
urlmon
URLDownloadToFileA
Sections
.text Size: 556KB - Virtual size: 555KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rodata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 65KB - Virtual size: 533KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 67KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ