Static task
static1
Behavioral task
behavioral1
Sample
26b4ff33bd5b3992e57098cd424e92ca_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
26b4ff33bd5b3992e57098cd424e92ca_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
26b4ff33bd5b3992e57098cd424e92ca_JaffaCakes118
-
Size
87KB
-
MD5
26b4ff33bd5b3992e57098cd424e92ca
-
SHA1
48d5d326da4b1522e7af4689a9f54b5db527d386
-
SHA256
dbacd1ed288602d02cdbbd7462be7501ea4cf21ea822f12ba5d788d9b309e2b1
-
SHA512
0caf6023670f8327010becd6d16f7e0300f2c3657b01c64f81ee89eb8ebc51d4d3c335a112960b029de1fdcd169df15fc880d7418ef64820f1bb1ec104073699
-
SSDEEP
1536:F9wER9Gq4444hwGfQfu2uuJwZh//o3LB0ix2qke5L:F2444hWun26Nw2ix5ke5L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 26b4ff33bd5b3992e57098cd424e92ca_JaffaCakes118
Files
-
26b4ff33bd5b3992e57098cd424e92ca_JaffaCakes118.exe windows:5 windows x86 arch:x86
6e3b514783a341d8f42e9cb8b453eebd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegEnumKeyA
RegSetValueExA
ws2_32
inet_addr
ntohs
sendto
recv
connect
select
WSAGetLastError
htons
socket
__WSAFDIsSet
closesocket
gethostbyname
send
WSAStartup
ioctlsocket
user32
CharLowerA
CharUpperA
CharUpperBuffA
wsprintfA
wvsprintfA
kernel32
HeapSize
RtlUnwind
HeapReAlloc
VirtualAlloc
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
EnterCriticalSection
LeaveCriticalSection
GetStringTypeW
lstrlenA
WaitForSingleObject
GetTickCount
WideCharToMultiByte
CreateProcessA
FileTimeToSystemTime
GetTimeZoneInformation
GetProcAddress
GetLocalTime
LoadLibraryA
GetModuleHandleA
CloseHandle
FileTimeToLocalFileTime
ExitProcess
CreateFileA
SystemTimeToFileTime
GetSystemTimeAsFileTime
WriteFile
Sleep
GetFileAttributesA
GetSystemDirectoryA
lstrcatA
ExitThread
GetLastError
CopyFileA
SetFileAttributesA
GetModuleFileNameA
CreateMutexA
GetTempPathA
DeleteFileA
CreateThread
lstrcpyA
lstrcmpA
lstrcpynA
HeapAlloc
InterlockedIncrement
InterlockedDecrement
HeapFree
GetProcessHeap
lstrcmpiA
GlobalFree
GetFileSize
GlobalAlloc
ReadFile
GetTempFileNameA
MapViewOfFile
UnmapViewOfFile
GetCurrentThread
GetWindowsDirectoryA
GetDriveTypeA
GetEnvironmentVariableA
SetThreadPriority
FindFirstFileA
FindClose
CreateFileMappingA
FindNextFileA
SetFilePointer
GetSystemTime
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
Sections
.text Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE