Static task
static1
Behavioral task
behavioral1
Sample
fe54b1df4bc650992ce201b0952f88ff_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fe54b1df4bc650992ce201b0952f88ff_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fe54b1df4bc650992ce201b0952f88ff_JaffaCakes118
-
Size
15KB
-
MD5
fe54b1df4bc650992ce201b0952f88ff
-
SHA1
30833c18873d0795a6ea59709e3b0febf37d0f20
-
SHA256
d298b4c9da309c97983fb57c157a7e8bb49b7963c0c84c4ef75d5e781c9b60b6
-
SHA512
74cf1930f33dc7e4b07b8053b4b480d712bfd86b42ad7f9566b87d32515e5d7f238a56c0be392ba5a5f00a08b71cf0fcd530bed928e946bb7085957b674d3ee6
-
SSDEEP
192:o6Bq23FJM8MKPsMEdGBybA+3PwcQ54I+/PwHWWaG7eWrxWvANUoy646j2e4hEgwo:om13qUKA+i54KV7Xrgvlk466e4hAo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fe54b1df4bc650992ce201b0952f88ff_JaffaCakes118
Files
-
fe54b1df4bc650992ce201b0952f88ff_JaffaCakes118.exe windows:4 windows x86 arch:x86
144642c5f57154c0be6c1670516d1857
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord2846
ord537
ord6648
ord4129
ord536
ord941
ord540
ord2818
ord356
ord823
ord2770
ord668
ord800
ord2781
ord4058
ord3181
ord2915
ord3178
ord2764
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__CxxFrameHandler
rand
srand
time
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_except_handler3
strncmp
atoi
strstr
strchr
sprintf
exit
_strcmpi
kernel32
ResumeThread
CreateProcessA
HeapAlloc
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatA
lstrcpyA
GetShortPathNameA
GetModuleFileNameA
GetSystemDirectoryA
CreateThread
GlobalMemoryStatus
GetVersionExA
CloseHandle
CreateRemoteThread
WriteProcessMemory
GetProcessHeap
GetEnvironmentVariableA
GetStartupInfoA
CopyFileA
GetLastError
lstrlenA
GetModuleHandleA
GetProcAddress
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
DeleteFileA
ExitThread
Sleep
GetCurrentProcessId
GetTickCount
VirtualAllocEx
user32
wsprintfA
comdlg32
GetFileTitleA
advapi32
DeleteService
OpenSCManagerA
SetServiceStatus
RegisterServiceCtrlHandlerA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
StartServiceCtrlDispatcherA
RegOpenKeyExA
RegCloseKey
CloseServiceHandle
RegSetValueExA
RegOpenKeyA
StartServiceA
CreateServiceA
OpenServiceA
shell32
ShellExecuteA
ws2_32
sendto
inet_addr
htons
setsockopt
WSASocketA
WSAStartup
gethostbyname
gethostname
htonl
socket
connect
inet_ntoa
send
closesocket
WSAGetLastError
recv
__WSAFDIsSet
select
urlmon
URLDownloadToFileA
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 242KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE