Static task
static1
Behavioral task
behavioral1
Sample
449ba56aa1ff6f9b086ff271cc8f6fe7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
449ba56aa1ff6f9b086ff271cc8f6fe7_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
449ba56aa1ff6f9b086ff271cc8f6fe7_JaffaCakes118
-
Size
156KB
-
MD5
449ba56aa1ff6f9b086ff271cc8f6fe7
-
SHA1
e2684972ee6478422ca41781f688ddc5e053c64d
-
SHA256
bd001ac9b986dce6b050fe552eb1f7cae37b7b6b0bdf612031647b7e87775abf
-
SHA512
8d1d85ce46e1a1983cb9773bd465f639e999631499a0f838803fbf7426aeb231affccae2f10dfdf6a7c7e8fc98e471a9d702a290d84a0e56df3192a80c56ba3c
-
SSDEEP
3072:DLXRLOYyzKNrds412HLn+K/pyALBYp0V2HX4LQh/lZebvMY:DlOYc2OL+48q/Szebb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 449ba56aa1ff6f9b086ff271cc8f6fe7_JaffaCakes118
Files
-
449ba56aa1ff6f9b086ff271cc8f6fe7_JaffaCakes118.exe windows:4 windows x86 arch:x86
e5838d2e400eeb058bf18b60791a780f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
WaitForSingleObject
CreateThread
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
ExitProcess
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
FlushInstructionCache
GetCurrentProcess
FreeLibrary
GetProcAddress
LoadLibraryA
GetShortPathNameA
SystemTimeToFileTime
lstrcpynA
GetPrivateProfileSectionA
ReleaseMutex
GetSystemTime
TerminateThread
WinExec
CreateDirectoryA
lstrcmpiA
FindClose
FindNextFileA
FindFirstFileA
SetCurrentDirectoryA
GetTickCount
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapFree
GetSystemDirectoryA
GetModuleFileNameA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
CreateMutexA
GetLastError
GetStringTypeExA
GetThreadLocale
OutputDebugStringA
DebugBreak
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
GetTempPathA
SetFileTime
GetFileTime
DeleteFileA
CopyFileA
GetFileSize
WriteFile
ReadFile
CloseHandle
CreateFileA
InterlockedIncrement
GetSystemDefaultLangID
lstrcpyA
lstrcatA
lstrlenA
RtlUnwind
lstrcmpA
InterlockedDecrement
user32
LoadImageA
GetSystemMetrics
SetWindowPos
MapWindowPoints
GetClientRect
SystemParametersInfoA
GetWindow
SetClassLongA
KillTimer
EndPaint
DrawIconEx
DrawTextA
ReleaseDC
GetDC
BeginPaint
PostThreadMessageA
PostQuitMessage
SendMessageTimeoutA
BringWindowToTop
CharUpperA
DialogBoxParamA
EndDialog
UpdateWindow
GetWindowTextA
MoveWindow
CreateWindowExA
RegisterClassExA
GetClassInfoExA
SetWindowTextA
GetDlgItem
GetParent
GetWindowLongA
GetCapture
InvalidateRect
SetCapture
GetWindowRect
ClientToScreen
PtInRect
ReleaseCapture
LoadCursorA
SetCursor
GetPropA
CallWindowProcA
RemovePropA
CharLowerA
SendMessageA
SetWindowLongA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
DestroyWindow
CreateDialogParamA
LoadStringA
CharNextA
wsprintfA
wvsprintfA
ShowWindow
SetTimer
SetFocus
IsDialogMessageA
LoadIconA
PostMessageA
SetPropA
gdi32
GetDeviceCaps
DPtoLP
SetBkMode
GetTextExtentPoint32A
CreateCompatibleDC
SelectObject
StretchBlt
DeleteDC
GetObjectA
CreateFontIndirectA
SetTextColor
DeleteObject
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
ole32
OleUninitialize
CoInitialize
CoUninitialize
OleInitialize
ws2_32
recv
inet_ntoa
gethostbyname
inet_addr
send
setsockopt
getprotobyname
socket
WSAStartup
WSACleanup
closesocket
connect
htons
shlwapi
StrToIntA
StrStrIA
shell32
ShellExecuteA
setupapi
SetupIterateCabinetA
wininet
InternetCrackUrlA
comctl32
InitCommonControlsEx
Sections
.text Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ