Static task
static1
Behavioral task
behavioral1
Sample
17dfa5df2646d32d84a0ba35af8f09f3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17dfa5df2646d32d84a0ba35af8f09f3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
17dfa5df2646d32d84a0ba35af8f09f3_JaffaCakes118
-
Size
500KB
-
MD5
17dfa5df2646d32d84a0ba35af8f09f3
-
SHA1
da2689970e91ec78775637ff747e369a92121361
-
SHA256
7ae3b17f142b5d43d24e0a8782e767a6f91bd9ac84b9a454b4a700b8c8f0d99c
-
SHA512
ab9d17cfb8b69e2f0bdd95bd4464cbc7c3dd166f7f4c654552b6ad7e8c2fddc34e90ac07af73651eb23fc6dc4cc3a244527e58f7b34669d483a85e0a3162fff4
-
SSDEEP
12288:kSjxz8G8lsngp8ZBzNevvXCCr9uE6iCH0NELfSG2DhXT8RYqSSw4:71z8JXCCBuEIH9EXBS7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17dfa5df2646d32d84a0ba35af8f09f3_JaffaCakes118
Files
-
17dfa5df2646d32d84a0ba35af8f09f3_JaffaCakes118.exe windows:4 windows x86 arch:x86
c8a795fad6d7f01f458865f5088a1384
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
IsBadWritePtr
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetCPInfo
IsValidLocale
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
SetUnhandledExceptionFilter
IsBadCodePtr
SetStdHandle
FlushFileBuffers
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetStringTypeA
GetStringTypeW
GetLocaleInfoW
GetCurrentDirectoryW
DeleteFileA
WaitForSingleObject
IsValidCodePage
GetExitCodeProcess
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapSize
GetCurrentProcess
TerminateProcess
HeapReAlloc
HeapFree
HeapAlloc
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
RtlUnwind
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetSystemTime
GetOEMCP
GetTickCount
GetLastError
Sleep
GetCurrentDirectoryA
CloseHandle
SetEndOfFile
SetFilePointer
MoveFileA
CompareFileTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
SystemTimeToFileTime
SetFileAttributesA
GetFileAttributesA
GetLocalTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
SetFileTime
WriteFile
GetACP
ReadFile
GetFileSize
LocalFree
FormatMessageA
GetFullPathNameW
GetFullPathNameA
GetTempPathW
GetTempPathA
GetModuleFileNameW
GetModuleFileNameA
MoveFileW
CopyFileW
CopyFileA
DeleteFileW
GetFileAttributesW
CreateDirectoryW
CreateDirectoryA
SetCurrentDirectoryW
SetCurrentDirectoryA
SetFileAttributesW
GetFileTime
GetTimeZoneInformation
CreateFileA
CreateFileW
IsBadReadPtr
GetVersionExA
WideCharToMultiByte
GetProcAddress
LoadLibraryA
LocalAlloc
FreeLibrary
user32
SetWindowPos
CreateWindowExW
DialogBoxParamW
LoadCursorA
RegisterClassExW
LoadStringW
TranslateMessage
DispatchMessageA
MessageBoxA
GetDlgItem
SendMessageA
GetMessageA
PostMessageA
SetTimer
GetDlgItemTextA
LoadStringA
DefWindowProcA
DestroyWindow
BeginPaint
EndPaint
SetDlgItemTextW
GetDlgItemTextW
SetWindowTextW
EnableWindow
SetDlgItemTextA
EndDialog
PostQuitMessage
MessageBoxW
GetDesktopWindow
GetWindowRect
CopyRect
OffsetRect
shell32
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteExW
crypt32
CertCloseStore
CertNameToStrA
CertFreeCertificateContext
CryptDecodeObject
ws2_32
WSAGetLastError
socket
inet_addr
gethostbyname
connect
htons
WSAStartup
ioctlsocket
select
closesocket
shutdown
send
recv
wininet
InternetCombineUrlA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
GetUserNameA
oleaut32
SysAllocString
SysFreeString
SysStringByteLen
Sections
.text Size: 428KB - Virtual size: 424KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ