lhxXfY9mIrDZ
Static task
static1
Behavioral task
behavioral1
Sample
b32e4862da5a2f1e482cb7d707445fe7_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
b32e4862da5a2f1e482cb7d707445fe7_JaffaCakes118
-
Size
238KB
-
MD5
b32e4862da5a2f1e482cb7d707445fe7
-
SHA1
a27e446c665cf3f805c56923bb32f1cf57e2854d
-
SHA256
a73f535352c59cc6f1ba1e2e563c7944021e169d6c978e576fc103a3e92fe6a1
-
SHA512
e5e211603556cce210c22b34596f5f7afb9379bcbc9328824ddc553d29101c974a8fd191c3dab74569170b3e9a6941b174a0f3e771557203c449b96aa1cce18f
-
SSDEEP
3072:qrZJ0spZady+KI+DLd7wNJfgnzNgy8MRNFKTOfQu0TQ1R:qrZJ08AdAISL6/Y9RDKGQNQ1R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b32e4862da5a2f1e482cb7d707445fe7_JaffaCakes118
Files
-
b32e4862da5a2f1e482cb7d707445fe7_JaffaCakes118.exe windows:4 windows x86 arch:x86
957e7f4e0923b1fa2719bafbe8f87147
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
gethostbyaddr
ntohl
setsockopt
htonl
bind
sendto
recvfrom
inet_addr
gethostname
inet_ntoa
WSAGetLastError
WSAStartup
gethostbyname
socket
htons
connect
closesocket
WSACleanup
send
recv
comctl32
ImageList_Create
ord17
ImageList_GetImageCount
ImageList_ReplaceIcon
PropertySheetA
mpr
WNetAddConnection2A
WNetCancelConnection2A
WNetCancelConnectionA
kernel32
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LocalFree
FormatMessageA
lstrcpyA
lstrcatW
SetLastError
lstrlenW
MultiByteToWideChar
GetProcAddress
GetCurrentThreadId
LoadLibraryA
GetVersionExA
Sleep
GetCurrentProcess
WaitForMultipleObjects
CreateThread
TerminateThread
VirtualAlloc
WideCharToMultiByte
lstrlenA
LocalAlloc
WritePrivateProfileStringA
GetPrivateProfileStringA
GetModuleFileNameA
FreeLibrary
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
GetLastError
GetSystemTimeAsFileTime
GetCurrentProcessId
user32
EnableWindow
LoadCursorA
LoadIconA
RegisterClassA
GetMessageA
TranslateMessage
DispatchMessageA
GetWindowRect
GetDlgItem
SetWindowPos
PostQuitMessage
GetMessagePos
MapWindowPoints
LoadMenuA
ClientToScreen
GetSubMenu
ModifyMenuA
TrackPopupMenu
DestroyMenu
DialogBoxParamA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetSystemMenu
AppendMenuA
CheckDlgButton
IsDlgButtonChecked
SetDlgItemTextA
MessageBoxA
SetWindowTextA
SendMessageA
PostMessageA
ShowWindow
GetDlgItemTextA
EndDialog
EnableMenuItem
gdi32
DeleteObject
advapi32
OpenSCManagerA
OpenServiceA
CloseServiceHandle
RegConnectRegistryA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegEnumKeyExA
RegQueryInfoKeyA
RegEnumValueA
AbortSystemShutdownA
InitiateSystemShutdownA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
EnumServicesStatusA
shell32
ShellExecuteA
msvcr80
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
strrchr
isdigit
_crt_debugger_hook
atol
realloc
mbstowcs
asctime
_gmtime64
free
strncpy
_acmdln
atoi
malloc
memcpy
perror
strncat
toupper
memset
sprintf
_decode_pointer
_adjust_fdiv
__p__commode
_except_handler4_common
_invoke_watson
_controlfp_s
__p__fmode
_encode_pointer
__set_app_type
_onexit
_initterm
__setusermatherr
sscanf
_configthreadlocale
_unlock
__dllonexit
_initterm_e
_lock
_stricmp
Exports
Exports
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ