Static task
static1
Behavioral task
behavioral1
Sample
fb18e9dcc794a5c8b4ce7cb4db2c8bc4_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fb18e9dcc794a5c8b4ce7cb4db2c8bc4_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
fb18e9dcc794a5c8b4ce7cb4db2c8bc4_JaffaCakes118
-
Size
44KB
-
MD5
fb18e9dcc794a5c8b4ce7cb4db2c8bc4
-
SHA1
94dad7d00c033e16379627e3cec88b5d20266882
-
SHA256
9f54940e1c6ad79dee98a1bde46a25eab40468d18217e36bd0713f1ac6241931
-
SHA512
938b2e297efbb71c64bff03deb80731af87d74e51c4d396c8a6e9c83d0f1529d2bc94b9785eaaf087f4b526b84b0aad81725bf9410172d903a09f2c6d30b4ec9
-
SSDEEP
384:D/Hmy0+cR4xN9FXlAdizoAUocf45XcoK7WCnB8C0GpxTCFMFZL1YGrOGkQ/1F3UG:D/q+Q4f9YdQ0ocfWGnqto1ndrOOkA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb18e9dcc794a5c8b4ce7cb4db2c8bc4_JaffaCakes118
Files
-
fb18e9dcc794a5c8b4ce7cb4db2c8bc4_JaffaCakes118.exe windows:4 windows x86 arch:x86
4c95c55857d667333ea0bfc6002ec2f6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
OpenMutexA
WinExec
GetTempPathA
MultiByteToWideChar
Process32Next
ExitProcess
CreateToolhelp32Snapshot
WaitForSingleObject
GetLastError
GetLocalTime
GlobalMemoryStatusEx
GetSystemInfo
GetSystemDefaultUILanguage
GetStartupInfoA
GetModuleHandleA
lstrlenA
GetModuleFileNameA
GetShortPathNameA
GetEnvironmentVariableA
SetPriorityClass
GetCurrentProcess
GetCurrentThread
SetThreadPriority
LoadLibraryA
GetProcAddress
CreateThread
CloseHandle
lstrcpyA
OutputDebugStringA
ExitThread
Sleep
GetTickCount
lstrcatA
Process32First
user32
wsprintfA
advapi32
RegSetValueExA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenServiceA
DeleteService
CloseServiceHandle
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegCloseKey
shell32
SHChangeNotify
ShellExecuteExA
msvcrt
srand
time
printf
_ftol
sprintf
fprintf
_iob
realloc
malloc
__CxxFrameHandler
strstr
atoi
strncpy
strcspn
wcscpy
memcpy
??2@YAPAXI@Z
??3@YAXPAX@Z
free
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
rand
strlen
memset
strcpy
strchr
strncat
strcat
_except_handler3
strcmp
_strnicmp
ws2_32
WSAGetLastError
WSACleanup
setsockopt
sendto
select
send
inet_addr
gethostbyname
socket
htons
connect
closesocket
__WSAFDIsSet
recv
WSAIoctl
WSAStartup
WSASocketA
htonl
shlwapi
SHDeleteKeyA
netapi32
NetUserAdd
NetLocalGroupAddMembers
msvcp60
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??A?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
??0Init@ios_base@std@@QAE@XZ
pdh
PdhOpenQueryA
PdhAddCounterA
PdhCollectQueryData
PdhGetFormattedCounterValue
PdhCloseQuery
PdhEnumObjectItemsA
iphlpapi
GetIfTable
Sections
.text Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 848B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ