Static task
static1
Behavioral task
behavioral1
Sample
ea5862ada92b41d32a4102ad6ef2f58e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ea5862ada92b41d32a4102ad6ef2f58e_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ea5862ada92b41d32a4102ad6ef2f58e_JaffaCakes118
-
Size
67KB
-
MD5
ea5862ada92b41d32a4102ad6ef2f58e
-
SHA1
c522cc8d525034db47393be88cc736825763420c
-
SHA256
e9e9086075be24e9f7221b7f8f7201d5d5052584490e804e246f3f36199a5899
-
SHA512
b779f7a60dc3925ed4d82fc23f8409f9b74e6852a882c4aa312c8069105661cc4e7ce014eb079e843d68f914dd4baefe8679cc78f63a50f42547604c6491cb42
-
SSDEEP
1536:5CsHTKsvFRgWl+tPziHMUAKEMEEMoa+D1O5LCiitIxh0C9L86Y:5CsVLt+tPKYEM5Q1O5LCiwhCV8p
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea5862ada92b41d32a4102ad6ef2f58e_JaffaCakes118
Files
-
ea5862ada92b41d32a4102ad6ef2f58e_JaffaCakes118.exe windows:4 windows x86 arch:x86
c33ecdfb0752b65584b5c402c227f292
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
uskin
ord1
mfc71
ord2714
ord2862
ord2540
ord2646
ord2533
ord2991
ord3718
ord3719
ord3709
ord2644
ord3949
ord4486
ord4261
ord3171
ord572
ord764
ord591
ord4132
ord2008
ord1302
ord4131
ord4674
ord4961
ord4507
ord4946
ord4649
ord4964
ord5053
ord4805
ord4364
ord4710
ord4796
ord4963
ord4377
ord4376
ord4287
ord4794
ord4948
ord4673
ord4516
ord4971
ord4480
ord4529
ord4970
ord4846
ord4501
ord4368
ord4439
ord5049
ord4559
ord4920
ord4520
ord4519
ord4914
ord3740
ord4444
ord4443
ord4790
ord4204
ord4781
ord4389
ord4980
ord4171
ord4178
ord4587
ord4776
ord4386
ord4401
ord4399
ord4381
ord4384
ord4379
ord4863
ord4860
ord3974
ord5914
ord1619
ord4244
ord5206
ord3344
ord1360
ord5166
ord1562
ord2717
ord4273
ord410
ord2419
ord2420
ord2421
ord2418
ord2417
ord648
ord5182
ord4212
ord4735
ord4890
ord2020
ord1671
ord1670
ord1551
ord5912
ord1401
ord5203
ord4262
ord578
ord4307
ord304
ord354
ord1793
ord1880
ord1791
ord1794
ord1885
ord1892
ord907
ord911
ord297
ord1123
ord2322
ord310
ord4104
ord4353
ord784
ord6236
ord1482
ord762
ord2164
ord2657
ord1917
ord655
ord5111
ord421
ord265
ord5419
ord6090
ord4129
ord4580
ord3650
ord3477
ord1903
ord2095
ord1591
ord4240
ord3317
ord741
ord5613
ord6119
ord6067
ord3676
ord3583
ord2098
ord1650
ord1594
ord4243
ord748
ord3881
ord6065
ord6282
ord709
ord501
ord4541
ord3683
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord1207
ord3948
ord4568
ord5230
ord5213
ord5566
ord2838
ord4481
ord3333
ord566
ord757
ord5975
ord1054
ord3830
ord1084
ord2371
ord1063
ord3182
ord4035
ord4749
ord266
ord781
ord2835
ord2731
ord2537
ord5200
ord1599
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2403
ord2415
ord2392
ord2408
ord2413
ord2396
ord2398
ord2400
ord2394
ord2410
ord2390
ord934
ord930
ord932
ord928
ord923
ord5233
ord5235
ord5960
ord1600
ord4282
ord4722
ord3403
ord5214
ord4185
ord6275
ord5073
ord1908
ord5152
ord4234
ord1402
ord3946
ord1617
ord1620
ord5915
ord1547
ord2089
ord4098
ord1483
ord1931
ord3441
ord3641
ord605
ord2248
msvcr71
_setmbcp
free
_except_handler3
??1exception@@UAE@XZ
??0exception@@QAE@XZ
__CxxFrameHandler
atoi
??0exception@@QAE@ABV0@@Z
_CxxThrowException
_controlfp
_mbsnbicmp
isalnum
time
clock
rand
memmove
ceil
srand
_beginthreadex
memset
__security_error_handler
??1type_info@@UAE@XZ
__dllonexit
_onexit
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
exit
_acmdln
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_stricmp
kernel32
ReleaseMutex
GetLastError
GetVersionExA
CreateMutexA
ExitProcess
OpenMutexA
FreeLibrary
GetProcAddress
CopyFileA
GetSystemDirectoryA
GetTickCount
GetCurrentProcessId
LoadLibraryA
CreateThread
Process32Next
Process32First
CreateToolhelp32Snapshot
Sleep
GetModuleHandleA
VirtualFree
VirtualAlloc
GetModuleFileNameA
SetEvent
CreateEventA
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetStartupInfoA
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
CloseHandle
user32
GetSystemMetrics
LoadIconA
SetTimer
IsIconic
GetSystemMenu
AppendMenuA
DrawIcon
GetClientRect
PostMessageA
GetWindowRect
SendMessageA
EnableWindow
shell32
ShellExecuteA
comctl32
ord17
msvcp71
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??$?MDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
ws2_32
closesocket
WSAEnumNetworkEvents
WSAWaitForMultipleEvents
recv
ioctlsocket
WSAEventSelect
WSACreateEvent
WSAGetLastError
connect
inet_addr
socket
WSACloseEvent
send
htons
WSAStartup
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ