Static task
static1
Behavioral task
behavioral1
Sample
407b01943a77fb2c72b91b7b919097b9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
407b01943a77fb2c72b91b7b919097b9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
407b01943a77fb2c72b91b7b919097b9_JaffaCakes118
-
Size
436KB
-
MD5
407b01943a77fb2c72b91b7b919097b9
-
SHA1
04a8ab556c1a5e85dc58ea99421f5107b6800ca2
-
SHA256
f392a57423af25e2641070d3a3bfd4f7fc518e81c880fe79fb04341caece4fe3
-
SHA512
209b270ea435b0bbfd02191b55e978bf90ad85c2cef2ff83c7470c388f31d70b755cadcf62140f3d59e39e53d26bb806ff6c991c3e2b6ea3f60046834686fc7d
-
SSDEEP
12288:HpTPCd0CvJ7zFPog/NgQf7mevPJPpOZSh9vqYe:HRPCd0UNbBS+pOYh9CYe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 407b01943a77fb2c72b91b7b919097b9_JaffaCakes118
Files
-
407b01943a77fb2c72b91b7b919097b9_JaffaCakes118.exe windows:4 windows x86 arch:x86
28a9a41e07cc53ac80713b463bbd547d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetPropA
GetMenuItemID
SetMessageQueue
SendIMEMessageExA
wininet
InternetSetOptionExA
CreateUrlCacheGroup
InternetQueryFortezzaStatus
DeleteUrlCacheContainerW
FtpSetCurrentDirectoryA
InternetGetConnectedStateExA
FtpFindFirstFileA
InternetCheckConnectionA
InternetCanonicalizeUrlA
FindFirstUrlCacheEntryA
InternetQueryDataAvailable
InternetQueryOptionW
GopherOpenFileA
advapi32
LookupAccountSidW
RegConnectRegistryA
CryptDestroyHash
CryptSetProviderW
CryptDuplicateKey
RegQueryMultipleValuesW
ReportEventA
CryptVerifySignatureW
DuplicateTokenEx
RegSetValueW
RegReplaceKeyA
LookupPrivilegeNameW
CryptExportKey
RegCreateKeyExW
CryptVerifySignatureA
comdlg32
ReplaceTextA
ChooseFontA
kernel32
SetHandleCount
LoadLibraryA
CompareStringW
GetLastError
GetSystemTimeAsFileTime
EnumSystemLocalesA
HeapCreate
GetTickCount
FlushViewOfFile
GetCurrentThread
EnterCriticalSection
GetModuleFileNameA
GetProcAddress
GetACP
GetStringTypeA
GetStringTypeW
GetStartupInfoA
GetOEMCP
HeapDestroy
InterlockedDecrement
VirtualAlloc
SetEndOfFile
HeapReAlloc
GetStartupInfoW
GetTimeZoneInformation
HeapSize
InitializeCriticalSection
SetLastError
LCMapStringA
WriteFile
GetTimeFormatA
MultiByteToWideChar
IsValidLocale
GetLocaleInfoW
ExitProcess
GetProcessHeap
SetConsoleCtrlHandler
TlsSetValue
SetUnhandledExceptionFilter
TlsGetValue
TlsAlloc
VirtualFree
SetEnvironmentVariableA
UnhandledExceptionFilter
WideCharToMultiByte
Sleep
GetUserDefaultLCID
GetStdHandle
GetVersionExA
GetCurrentThreadId
IsValidCodePage
CreateSemaphoreW
GetWindowsDirectoryW
InterlockedIncrement
RtlUnwind
GetDateFormatA
DuplicateHandle
LeaveCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStringsW
FindNextFileA
GetWindowsDirectoryA
TlsFree
GetCurrentProcessId
GetCurrentProcess
GetEnvironmentStrings
IsDebuggerPresent
QueryPerformanceCounter
HeapFree
GetModuleFileNameW
GetFileType
GetLocaleInfoA
FreeLibrary
LCMapStringW
InterlockedExchange
GetCPInfo
CompareStringA
VirtualAllocEx
TerminateProcess
GetCommandLineA
GetCommandLineW
HeapAlloc
GetModuleHandleA
DeleteCriticalSection
VirtualQuery
FreeEnvironmentStringsW
shell32
SHAddToRecentDocs
FindExecutableW
SHGetFileInfo
SHQueryRecycleBinW
ExtractIconA
RealShellExecuteW
ShellExecuteExW
ExtractIconW
Sections
.text Size: 151KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 275KB - Virtual size: 275KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ