Static task
static1
Behavioral task
behavioral1
Sample
42afac34041f03e5ea974cd3cf2dcaaa_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
42afac34041f03e5ea974cd3cf2dcaaa_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
42afac34041f03e5ea974cd3cf2dcaaa_JaffaCakes118
-
Size
168KB
-
MD5
42afac34041f03e5ea974cd3cf2dcaaa
-
SHA1
77ad63a3a28b1d1b1ac3684adc7660ca481146e8
-
SHA256
816283596572902b9f68882fc80b2e562ae6bfc63c3fa60539cefb9aeb3afd4d
-
SHA512
75a4e4a6bb2be37127e804d69589f88bc092256a828646d7935cf2f1df6157578a60005831dd71948c446e184015bf693237e5cf6c7aa8d4d8382b0add4f8ce5
-
SSDEEP
3072:7J0A2KvUXh9O5P908zsStvqeSwCKx83lUICxsqcKuT:10A2auu10usSJbuKxAlicpT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 42afac34041f03e5ea974cd3cf2dcaaa_JaffaCakes118
Files
-
42afac34041f03e5ea974cd3cf2dcaaa_JaffaCakes118.exe windows:4 windows x86 arch:x86
369a8f5ac34ea9a2eb932ddbbd99104e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
GetWindowsDirectoryA
WaitForSingleObject
GetFileSize
ReadFile
GetFileAttributesA
GetSystemTime
CreateToolhelp32Snapshot
Process32First
Process32Next
GetCurrentThread
CreateEventA
TerminateThread
LoadLibraryA
SuspendThread
lstrcatA
LeaveCriticalSection
CreateProcessA
SetEvent
GetStartupInfoA
GetProcAddress
GetCurrentThreadId
WaitForMultipleObjects
GetModuleHandleA
WideCharToMultiByte
GetCurrentProcess
InitializeCriticalSection
CopyFileA
SetLastError
GetVersionExA
lstrlenA
GetModuleFileNameA
Sleep
ExitProcess
GetTempPathA
CreateFileA
CloseHandle
GetLastError
lstrcmpiA
lstrcpyA
GetCurrentProcessId
GetTickCount
EnterCriticalSection
msvcrt
__CxxFrameHandler
_beginthreadex
_beginthread
printf
_mbsicmp
sprintf
strstr
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
fwrite
fprintf
fopen
fclose
sscanf
_mbsstr
_mbsnbcpy
strchr
srand
rand
malloc
free
_except_handler3
_ftol
advapi32
RegOpenKeyExA
RegSaveKeyA
RegRestoreKeyA
RegQueryValueExA
SetServiceStatus
RegisterServiceCtrlHandlerW
ChangeServiceConfig2A
DeleteService
GetUserNameA
StartServiceCtrlDispatcherA
user32
PeekMessageA
wsprintfA
CharLowerA
PostThreadMessageA
GetMessageA
shell32
ShellExecuteA
iphlpapi
GetBestInterface
GetAdaptersInfo
ws2_32
sendto
WSAGetLastError
htonl
gethostbyname
closesocket
connect
htons
inet_ntoa
send
setsockopt
WSAStartup
WSAIoctl
shutdown
select
__WSAFDIsSet
recv
inet_addr
socket
dnsapi
DnsQuery_A
DnsRecordListFree
shlwapi
SHDeleteKeyA
Sections
.text Size: 148KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
text Size: 4KB - Virtual size: 236B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xdata Size: 4KB - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ