Static task
static1
Behavioral task
behavioral1
Sample
434dfa99d53257edcabfc7d270ede853_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
434dfa99d53257edcabfc7d270ede853_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
434dfa99d53257edcabfc7d270ede853_JaffaCakes118
-
Size
228KB
-
MD5
434dfa99d53257edcabfc7d270ede853
-
SHA1
7789f10246189a503cf6f70026d9a3aac50593aa
-
SHA256
ed0f14675850f6f33e52397f166bf2c6b56f8c2a4b6ea2afeae680b5ea2ede18
-
SHA512
ed6108e2c2083104268a88f47798130e72815ec01704a3ed2142d90df87a49636267b0f00dfbbb5f950c01f16edcee3e65d197e7fab6dbeff2b624a8a7129212
-
SSDEEP
6144:5+E5+E6+Ec+Em+EL+EW+Ez+ES+Ez+EF+E/+EV+EGJLn+Ee+Eb+Eg+Ez+Ek+EB+EB:Un0acnIVO5XTlXSOVI18/Nvv922PnL4y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 434dfa99d53257edcabfc7d270ede853_JaffaCakes118
Files
-
434dfa99d53257edcabfc7d270ede853_JaffaCakes118.exe windows:4 windows x86 arch:x86
0cca6594321b24fec0bb034aecc3d917
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
EnumProcessModules
GetModuleFileNameExA
GetModuleBaseNameA
kernel32
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
FindClose
FindFirstFileA
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateEventA
TerminateThread
WaitForSingleObject
GetModuleFileNameA
CreateFileA
WriteFile
ResetEvent
WaitForMultipleObjects
SetFilePointer
GetShortPathNameA
TerminateProcess
OpenProcess
CreateDirectoryA
GetFileSize
GetTickCount
SetFileAttributesA
GetFileAttributesA
ReadFile
DeleteFileA
SetEvent
OpenEventA
CloseHandle
WideCharToMultiByte
GetLocaleInfoW
GetLocaleInfoA
TlsFree
FindAtomA
LocalHandle
UnlockFile
Sleep
CreateThread
GetStartupInfoA
GetModuleHandleA
GlobalAlloc
GlobalFree
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
HeapLock
HeapWalk
HeapUnlock
HeapFree
HeapAlloc
HeapDestroy
HeapCreate
GetExitCodeProcess
CreatePipe
GetDriveTypeA
GetVolumeInformationA
GetLongPathNameA
GetCurrentProcessId
FindNextFileA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetExitCodeThread
DuplicateHandle
GetCurrentProcess
CreateProcessA
user32
SetWindowPos
IsWindow
SendMessageA
DestroyWindow
GetSystemMetrics
FindWindowA
PostMessageA
GetDesktopWindow
PostThreadMessageA
GetMessageA
GetWindowTextA
GetWindowLongA
GetWindowThreadProcessId
GetWindow
gdi32
BitBlt
GetObjectA
GetBkColor
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
GetDIBits
advapi32
RegCloseKey
RegEnumValueA
RegQueryInfoKeyA
RegOpenKeyExA
shell32
SHFileOperationA
ShellExecuteA
SHGetSpecialFolderPathA
ExtractAssociatedIconA
ole32
CoInitialize
CoCreateGuid
CoUninitialize
CLSIDFromProgID
StringFromGUID2
ws2_32
connect
WSACancelAsyncRequest
shutdown
getsockname
recvfrom
WSAGetLastError
ntohs
sendto
closesocket
recv
WSACleanup
WSAStartup
gethostbyname
gethostname
htons
WSAIoctl
socket
bind
send
winmm
timeSetEvent
timeKillEvent
timeGetSystemTime
gdiplus
GdipCloneImage
GdipAlloc
GdipFree
GdipLoadImageFromFile
GdiplusStartup
GdipSaveImageToFile
GdipDisposeImage
GdipGetImageEncodersSize
GdipGetImageEncoders
GdiplusShutdown
mfc42
ord800
ord1601
ord537
ord3571
ord3663
ord3626
ord2414
ord640
ord665
ord1979
ord5186
ord354
ord5785
ord1641
ord1640
ord323
msvcrt
srand
rand
_ftol
_purecall
malloc
pow
free
wcscmp
_strupr
_strset
??1type_info@@UAE@XZ
memcmp
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
__dllonexit
_onexit
_controlfp
strchr
memcpy
strlen
strrchr
_CxxThrowException
memset
strcpy
strstr
strcmp
__CxxFrameHandler
sprintf
_exit
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
Sections
.text Size: 180KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ