Behavioral task
behavioral1
Sample
04d1efa4a7413968e9b2e23c13251266_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
04d1efa4a7413968e9b2e23c13251266_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
04d1efa4a7413968e9b2e23c13251266_JaffaCakes118
-
Size
991KB
-
MD5
04d1efa4a7413968e9b2e23c13251266
-
SHA1
ee57a9d7d5631344ed0ce07ff135f09d5232a53f
-
SHA256
48db227c245337a74c8d9d95ec97cdc5f8f0f0b52b204b894844b0f477683374
-
SHA512
dbe382f2069f500b82f770374e3f83a6f92f186f89b4b57530162f9fb2c0904906bdbc961bf08da30b5de4fa5bfd5038eb1f39113844861c4f0e7158c38b51d8
-
SSDEEP
24576:1pOLmc7xNQKdOaGPFG5V8N+A/j+Qar2e7bdX:xc7xNqrPwV8N+A/S/h7
Malware Config
Signatures
Files
-
04d1efa4a7413968e9b2e23c13251266_JaffaCakes118.exe windows:6 windows x64 arch:x64
ff6ddf97aebf9a655f185e0d15920fed
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ws2_32
gethostname
connect
WSACleanup
__WSAFDIsSet
accept
send
ntohs
recv
WSAPoll
WSASetLastError
WSAStartup
select
WSARecvFrom
htonl
bind
WSAIoctl
WSASend
shutdown
listen
WSASocketW
getsockname
socket
WSARecv
ioctlsocket
FreeAddrInfoW
GetAddrInfoW
closesocket
getsockopt
setsockopt
WSAGetLastError
htons
iphlpapi
GetAdaptersAddresses
kernel32
GetUserDefaultLCID
IsValidLocale
HeapAlloc
HeapFree
ExitProcess
GetModuleHandleExW
ExitThread
SetFileAttributesW
EnumSystemLocalesW
GetConsoleCP
SetStdHandle
GetCommandLineW
GetCommandLineA
RtlPcToFileHeader
RtlUnwindEx
GetFileAttributesExW
HeapReAlloc
GetStdHandle
SetConsoleMode
GetConsoleMode
Sleep
CloseHandle
FreeConsole
GetConsoleWindow
SetThreadAffinityMask
GetCurrentProcess
GetCurrentThread
GetProcAddress
GetModuleHandleW
GetSystemInfo
MultiByteToWideChar
GetLastError
LocalFree
FreeLibrary
FormatMessageA
LoadLibraryExW
SetConsoleCtrlHandler
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
PostQueuedCompletionStatus
SetErrorMode
GetQueuedCompletionStatus
CreateIoCompletionPort
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
RegisterWaitForSingleObject
UnregisterWait
GetConsoleCursorInfo
CreateFileW
DuplicateHandle
QueueUserWorkItem
SetConsoleCursorInfo
FillConsoleOutputCharacterW
ReadConsoleInputW
CreateFileA
ReadConsoleW
WriteConsoleInputW
FillConsoleOutputAttribute
WriteConsoleW
GetNumberOfConsoleInputEvents
WideCharToMultiByte
SetConsoleCursorPosition
CreateDirectoryW
ReadFile
SetLastError
WriteFile
DeviceIoControl
RemoveDirectoryW
SetFileTime
GetTimeZoneInformation
GetFileAttributesW
GetFileInformationByHandle
SetFilePointerEx
MoveFileExW
CopyFileW
FlushFileBuffers
GetLongPathNameW
GetShortPathNameW
GetCurrentDirectoryW
ReadDirectoryChangesW
GetFileType
TlsSetValue
ReleaseSemaphore
WaitForMultipleObjects
WaitForSingleObject
ResumeThread
SetEvent
TlsAlloc
ResetEvent
DeleteCriticalSection
CreateSemaphoreW
TlsGetValue
TlsFree
CreateSemaphoreA
CreateEventA
CancelIo
SetHandleInformation
VerifyVersionInfoA
GetModuleFileNameW
SetEnvironmentVariableW
QueryPerformanceFrequency
VerSetConditionMask
GetCurrentProcessId
QueryPerformanceCounter
DebugBreak
SetNamedPipeHandleState
CreateNamedPipeW
PeekNamedPipe
GetNamedPipeHandleStateA
SwitchToThread
ConnectNamedPipe
GetModuleHandleA
LoadLibraryA
TerminateProcess
UnregisterWaitEx
LCMapStringW
GetExitCodeProcess
GetStartupInfoW
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
GetTickCount64
VirtualFree
VirtualAlloc
RaiseException
FreeLibraryAndExitThread
GetThreadTimes
HeapSize
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
SetEndOfFile
CreateHardLinkW
CreateEventW
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
GetCPInfo
CompareStringW
GetLocaleInfoW
GetStringTypeW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
InitializeSListHead
CreateThread
user32
MapVirtualKeyW
ShowWindow
GetMessageA
TranslateMessage
DispatchMessageA
shell32
SHGetSpecialFolderPathA
advapi32
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
Sections
.text Size: 596KB - Virtual size: 595KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 259KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ