Static task
static1
Behavioral task
behavioral1
Sample
3a970948fb5fdfb45f4cec8159c6aad1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3a970948fb5fdfb45f4cec8159c6aad1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3a970948fb5fdfb45f4cec8159c6aad1_JaffaCakes118
-
Size
56KB
-
MD5
3a970948fb5fdfb45f4cec8159c6aad1
-
SHA1
c8d3aca1a7e3edbb33557a3e71f676b34090ebb2
-
SHA256
d7cbb0364a26e3d2ed7e208b7cbb9f7e9867fe62d4af83ef44e605256a91f9df
-
SHA512
c7b7f4b89ee224d50f1478052ce05124375d92382e8d62d93b0f853c88a4786dbd3b40b36ec5685bea09001c4f49efdb8bcaa57419382fd694199b76d177bc34
-
SSDEEP
1536:A5MgNqR2Io9yUpcfaBadWu5MKnH2RpT9:A5M0qQIorpcfaoz5X2Rh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a970948fb5fdfb45f4cec8159c6aad1_JaffaCakes118
Files
-
3a970948fb5fdfb45f4cec8159c6aad1_JaffaCakes118.exe windows:4 windows x86 arch:x86
93e817f96a0d411c49102b6d9bd43d1d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EnumWindows
CloseClipboard
keybd_event
VkKeyScanA
IsWindow
SetFocus
wsprintfA
BlockInput
OpenClipboard
EmptyClipboard
SetClipboardData
GetWindowTextA
CharLowerA
FindWindowA
ShowWindow
BringWindowToTop
SetForegroundWindow
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
SysAllocString
VariantClear
SysFreeString
VariantInit
urlmon
URLDownloadToFileA
kernel32
FindFirstFileA
GetStartupInfoA
WideCharToMultiByte
TerminateThread
lstrcpyA
lstrcmpA
lstrcpynA
GetSystemTime
ReadFile
InterlockedDecrement
GlobalLock
GlobalUnlock
SetCurrentDirectoryA
GetFullPathNameA
FindNextFileA
FindClose
GetFileSize
SetFilePointer
Sleep
GetTempPathA
GetLastError
CreateThread
ExitProcess
lstrcmpiA
WaitForSingleObject
CreateProcessA
ExpandEnvironmentStringsA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LoadLibraryA
CloseHandle
GetCurrentProcess
ExitThread
ReleaseMutex
GetTickCount
CreateMutexA
GetLocaleInfoA
GetVersionExA
GetFileAttributesA
CopyFileA
SetFileAttributesA
GetWindowsDirectoryA
WriteFile
CreateFileA
lstrlenA
CreateDirectoryA
lstrcatA
GetDriveTypeA
GetLogicalDriveStringsA
GlobalFree
GlobalAlloc
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
msvcrt
__CxxFrameHandler
atoi
wcslen
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
strstr
strlen
strcpy
strchr
sprintf
rand
memset
_snprintf
memcmp
strncpy
srand
strtok
strcmp
_vsnprintf
??2@YAPAXI@Z
memcpy
strcat
free
malloc
_except_handler3
advapi32
GetUserNameA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
ws2_32
connect
socket
ioctlsocket
closesocket
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 277KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE