Static task
static1
Behavioral task
behavioral1
Sample
06d3dd7387a6a8ada7427ec808d4e076_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
06d3dd7387a6a8ada7427ec808d4e076_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
06d3dd7387a6a8ada7427ec808d4e076_JaffaCakes118
-
Size
66KB
-
MD5
06d3dd7387a6a8ada7427ec808d4e076
-
SHA1
26f0d63a5b63926a2db40e81aba93ec6e278fdee
-
SHA256
7ade7a45eb714a288d4a26ffd9a8826a08eadac6b5f26ebe298562445832f6cd
-
SHA512
41bfd7e4e0540a633fa367913226a8a639c8e9d1f83aaa953bdcc5702f766d5ac7a4d677fc68c7b335ccdea037bf0a3f66808c2ce3bdef65781fc6971694cf27
-
SSDEEP
1536:rS1hRXSzVd4qnRrMyYbAm2LeV46YkxyACKZLatFnToIfkNz8mo:UrXSzUqR4fbA/CC/ttTBf+z8mo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 06d3dd7387a6a8ada7427ec808d4e076_JaffaCakes118
Files
-
06d3dd7387a6a8ada7427ec808d4e076_JaffaCakes118.exe windows:4 windows x86 arch:x86
3bf27b83e0c98731800c31d3281c474f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
Process32Next
Module32First
Process32First
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
ExitProcess
CopyFileA
DeleteFileA
CreateThread
lstrcmpiA
WaitForSingleObject
MoveFileA
GetFileSize
CreateFileA
WriteFile
GetLogicalDriveStringsA
GetShortPathNameA
GetVersionExA
GetComputerNameA
GetTickCount
HeapAlloc
GetProcessHeap
GetCurrentProcessId
GetModuleHandleA
VirtualAlloc
VirtualQueryEx
ReadProcessMemory
GetThreadContext
SetThreadContext
WriteProcessMemory
VirtualProtectEx
VirtualFree
GetCurrentThreadId
GetEnvironmentVariableA
GlobalAlloc
LoadLibraryExA
GlobalFree
DeviceIoControl
lstrcpyA
lstrcatA
GetCurrentProcess
SetPriorityClass
GetCurrentThread
SetThreadPriority
ResumeThread
SetFileAttributesA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLastError
ReadFile
FindNextFileA
FindClose
GetDriveTypeA
CreatePipe
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
CloseHandle
Sleep
GlobalMemoryStatus
user32
wsprintfA
MessageBoxA
GetSystemMetrics
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
CloseWindowStation
CloseDesktop
GetProcessWindowStation
GetDesktopWindow
SetCursorPos
keybd_event
ExitWindowsEx
mouse_event
gdi32
GetDIBits
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCA
DeleteDC
DeleteObject
advapi32
AdjustTokenPrivileges
DeleteService
OpenSCManagerA
CreateServiceA
OpenServiceA
CloseServiceHandle
StartServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
LookupPrivilegeValueA
OpenProcessToken
StartServiceCtrlDispatcherA
ControlService
shell32
ShellExecuteA
SHGetFileInfoA
msvcrt
_acmdln
puts
printf
_strlwr
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
free
sprintf
strncpy
??2@YAPAXI@Z
__CxxFrameHandler
atoi
strcspn
strstr
??3@YAXPAX@Z
_ftol
fclose
fprintf
fopen
rand
memmove
malloc
__dllonexit
_onexit
_exit
_XcptFilter
exit
ws2_32
WSAStartup
setsockopt
sendto
htonl
WSASocketA
htons
socket
closesocket
recv
shutdown
inet_addr
gethostbyname
send
connect
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
sdfee Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE