Static task
static1
Behavioral task
behavioral1
Sample
104a73715a5e2befd9e87e8854446576_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
104a73715a5e2befd9e87e8854446576_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
104a73715a5e2befd9e87e8854446576_JaffaCakes118
-
Size
396KB
-
MD5
104a73715a5e2befd9e87e8854446576
-
SHA1
71bd55f87c28b9f808a1b74af1795a6c9b3dd551
-
SHA256
dde559170da78a41c43c37914cb5b896eb7f4cbb5b072469a53ad1b9452f91de
-
SHA512
88c526c4968efe99c1ea5c563d6fff85455024a981dfa6a1a5043cfa240f6df42cf78519f6b8dd11741983c99d7d11b59294644c2150779083b6bf7854a965df
-
SSDEEP
3072:yQpzouzhqCng6DEu+I9SwrHRlp/dcBaLOBOAFWLz8/:Jlg6DEu+fwb1/d8eLCWLz8/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 104a73715a5e2befd9e87e8854446576_JaffaCakes118
Files
-
104a73715a5e2befd9e87e8854446576_JaffaCakes118.exe windows:4 windows x86 arch:x86
bcb0f1a3f1365f6ca630135296d4c39d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
dnsapi
DnsQuery_A
DnsRecordListFree
kernel32
TlsAlloc
GlobalFree
GlobalHandle
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
WritePrivateProfileStringA
GetProcessVersion
GetCPInfo
GetOEMCP
GetSystemTimeAsFileTime
RtlUnwind
GetLocalTime
GetStartupInfoA
HeapAlloc
HeapFree
TerminateProcess
RaiseException
GetACP
GetFileType
HeapReAlloc
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetModuleHandleA
GetFileTime
GetFileSize
GetFileAttributesA
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalUnlock
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
LoadLibraryA
GetProcAddress
SetEndOfFile
UnlockFile
LockFile
CloseHandle
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
lstrcpynA
lstrcpyA
lstrcatA
SetErrorMode
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
FreeLibrary
GetSystemTime
GetCommandLineA
GetModuleFileNameA
CreateProcessA
FormatMessageA
LocalAlloc
LocalFree
GetTickCount
SetLastError
GetTimeZoneInformation
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
OpenEventA
GetLastError
CreateEventA
WaitForSingleObject
ResetEvent
SetEvent
DeleteFileA
SetCurrentDirectoryA
CreateThread
ExitProcess
GetWindowsDirectoryA
Sleep
SetStdHandle
InterlockedExchange
user32
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
SetCursor
GetClassNameA
PtInRect
GetSysColorBrush
DestroyMenu
IsWindowVisible
GetTopWindow
MessageBoxA
GetParent
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetDlgCtrlID
GetKeyState
DestroyWindow
SetWindowsHookExA
CallNextHookEx
GetClassLongA
UnhookWindowsHookEx
IsWindowEnabled
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
GetWindowLongA
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindowTextA
GetSystemMetrics
CharUpperA
EnableWindow
PeekMessageA
PostMessageA
wsprintfA
SendMessageA
BeginPaint
GetClientRect
DrawTextA
EndPaint
PostQuitMessage
DefWindowProcA
KillTimer
SetTimer
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
GetMessageA
GetPropA
SetWindowTextA
TranslateMessage
DispatchMessageA
GetActiveWindow
ValidateRect
GetCursorPos
GrayStringA
TabbedTextOutA
ReleaseDC
GetDC
ClientToScreen
MapWindowPoints
GetFocus
SetFocus
AdjustWindowRectEx
SetPropA
CopyRect
GetSysColor
gdi32
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteObject
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
CreateBitmap
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
comctl32
ord17
wsock32
WSAAsyncSelect
inet_ntoa
recvfrom
sendto
WSAGetLastError
WSAStartup
select
htonl
recv
send
connect
htons
WSASetLastError
socket
gethostbyname
inet_addr
gethostname
ioctlsocket
gethostbyaddr
bind
accept
closesocket
WSACleanup
Sections
.text Size: 147KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pklstb Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.relo2 Size: 60B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ