Static task
static1
Behavioral task
behavioral1
Sample
49ad4c6e2ccb92e4d4d7c910c2c6970c_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
49ad4c6e2ccb92e4d4d7c910c2c6970c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
49ad4c6e2ccb92e4d4d7c910c2c6970c_JaffaCakes118
-
Size
172KB
-
MD5
49ad4c6e2ccb92e4d4d7c910c2c6970c
-
SHA1
e9bf947a34e520942fc5a3cc495f1849d14b87da
-
SHA256
f3eab7cdff68385e5bcb1e3a9a0f3043df0e96e63b6b0513855c1b6ca0083407
-
SHA512
405471e09418e12430bb388e9352ff0e3abbcc36714276e3dec704b4ab53ee1045efaba99842b9754bf7078ac0e0d5baf4b229b1a72fea0f0731c83a6416b290
-
SSDEEP
3072:iJ0A2KvUXh9O5P908zsStvqeSwCKx83lUICxsqcAeOQ:i0A2auu10usSJbuKxAlicbO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 49ad4c6e2ccb92e4d4d7c910c2c6970c_JaffaCakes118
Files
-
49ad4c6e2ccb92e4d4d7c910c2c6970c_JaffaCakes118.exe windows:4 windows x86 arch:x86
369a8f5ac34ea9a2eb932ddbbd99104e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
GetWindowsDirectoryA
WaitForSingleObject
GetFileSize
ReadFile
GetFileAttributesA
GetSystemTime
CreateToolhelp32Snapshot
Process32First
Process32Next
GetCurrentThread
CreateEventA
TerminateThread
LoadLibraryA
SuspendThread
lstrcatA
LeaveCriticalSection
CreateProcessA
SetEvent
GetStartupInfoA
GetProcAddress
GetCurrentThreadId
WaitForMultipleObjects
GetModuleHandleA
WideCharToMultiByte
GetCurrentProcess
InitializeCriticalSection
CopyFileA
SetLastError
GetVersionExA
lstrlenA
GetModuleFileNameA
Sleep
ExitProcess
GetTempPathA
CreateFileA
CloseHandle
GetLastError
lstrcmpiA
lstrcpyA
GetCurrentProcessId
GetTickCount
EnterCriticalSection
msvcrt
__CxxFrameHandler
_beginthreadex
_beginthread
printf
_mbsicmp
sprintf
strstr
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
fwrite
fprintf
fopen
fclose
sscanf
_mbsstr
_mbsnbcpy
strchr
srand
rand
malloc
free
_except_handler3
_ftol
advapi32
RegOpenKeyExA
RegSaveKeyA
RegRestoreKeyA
RegQueryValueExA
SetServiceStatus
RegisterServiceCtrlHandlerW
ChangeServiceConfig2A
DeleteService
GetUserNameA
StartServiceCtrlDispatcherA
user32
PeekMessageA
wsprintfA
CharLowerA
PostThreadMessageA
GetMessageA
shell32
ShellExecuteA
iphlpapi
GetBestInterface
GetAdaptersInfo
ws2_32
sendto
WSAGetLastError
htonl
gethostbyname
closesocket
connect
htons
inet_ntoa
send
setsockopt
WSAStartup
WSAIoctl
shutdown
select
__WSAFDIsSet
recv
inet_addr
socket
dnsapi
DnsQuery_A
DnsRecordListFree
shlwapi
SHDeleteKeyA
Sections
.text Size: 148KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
text Size: 4KB - Virtual size: 236B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xdata Size: 4KB - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ