Static task
static1
Behavioral task
behavioral1
Sample
08453c78a4c4e608dac8afcda9793077_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
08453c78a4c4e608dac8afcda9793077_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
08453c78a4c4e608dac8afcda9793077_JaffaCakes118
-
Size
26KB
-
MD5
08453c78a4c4e608dac8afcda9793077
-
SHA1
efad8cd4c95e0532d6acc4f116fdb7b4a2801593
-
SHA256
a486c688dbb0fbb21909476857f47ebf5d8afd9519e582fb45bc38d275971c88
-
SHA512
f84842c2e26296a49d526908a5b94f2d76634eac5bbad7f5e7d3a8b8faae73fc98b81788f6e230348f7bda8337226eaa869ed110390ea05840393464dfa12625
-
SSDEEP
384:wYA1RVM73EM6cxmuIi58+BAe7AlRlDFbLx86bNcjEOoO9O6Ou6+8dWqp+OfaxOSx:rymoqxm0nx7sRvLx86SjEQOW/MaxODq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08453c78a4c4e608dac8afcda9793077_JaffaCakes118
Files
-
08453c78a4c4e608dac8afcda9793077_JaffaCakes118.exe windows:4 windows x86 arch:x86
821c3c157aa70dd41f3fb8b96793b6d9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Process32Next
Process32First
CreateToolhelp32Snapshot
WaitForSingleObject
OpenProcess
CopyFileA
GetSystemInfo
GetSystemDefaultUILanguage
GetVersionExA
GetThreadLocale
TerminateProcess
GetTempPathA
WinExec
lstrlenA
OpenMutexA
ReleaseMutex
ExitProcess
GetModuleFileNameA
GetShortPathNameA
GetEnvironmentVariableA
SetPriorityClass
GetCurrentProcess
GetCurrentThread
SetThreadPriority
LoadLibraryA
GetProcAddress
CloseHandle
CreateThread
MultiByteToWideChar
lstrcpyA
OutputDebugStringA
ExitThread
Sleep
GetTickCount
lstrcatA
GetLastError
GetLocaleInfoA
GetACP
GetSystemTimeAsFileTime
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
user32
wsprintfA
advapi32
CreateServiceA
StartServiceA
RegOpenKeyA
RegisterServiceCtrlHandlerA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SetServiceStatus
OpenServiceA
CloseServiceHandle
DeleteService
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
StartServiceCtrlDispatcherA
shell32
SHChangeNotify
ShellExecuteExA
msvcr80
__CxxFrameHandler3
atoi
strncpy
strcspn
??_U@YAPAXI@Z
??2@YAPAXI@Z
_CxxThrowException
strncmp
_except_handler4_common
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_invoke_watson
_controlfp_s
printf
srand
rand
_time64
strstr
??3@YAXPAX@Z
memset
strchr
malloc
realloc
__iob_func
fprintf
__setusermatherr
sprintf
ws2_32
WSAIoctl
setsockopt
htonl
recv
WSACleanup
WSAGetLastError
select
__WSAFDIsSet
WSASocketA
closesocket
connect
htons
sendto
WSAStartup
send
inet_addr
gethostbyname
socket
shlwapi
SHDeleteKeyA
netapi32
NetLocalGroupAddMembers
NetUserAdd
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ