Static task
static1
Behavioral task
behavioral1
Sample
08cdfb8f9ff7c033d524960591bdd3da_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
08cdfb8f9ff7c033d524960591bdd3da_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
08cdfb8f9ff7c033d524960591bdd3da_JaffaCakes118
-
Size
39KB
-
MD5
08cdfb8f9ff7c033d524960591bdd3da
-
SHA1
800b90a5badd9f8ec028ea7b95a7b22c3b3e615f
-
SHA256
5b587573b37c42606e9cfd0fbd3b42b1074c3755d3d914c5a78e9215b8515eff
-
SHA512
af2d137740d138cdf4624ebd92c50ba60343c5aff477a69d96d9c505fc0db01b241530c85b9deb56f2630a49fa666519ee75cf858c93a8e33feb7ada2c20b15f
-
SSDEEP
768:FUmTrfhVu/mWKCkCMgIUlk54+yIdNqEA1fl7UuoA0n:LlWK13gcPdNrXuoAi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08cdfb8f9ff7c033d524960591bdd3da_JaffaCakes118
Files
-
08cdfb8f9ff7c033d524960591bdd3da_JaffaCakes118.exe windows:4 windows x86 arch:x86
b9b3a1b6f521e663a2359134a7917ead
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSASocketA
setsockopt
htonl
sendto
inet_addr
gethostbyname
recv
WSACleanup
WSAGetLastError
closesocket
WSAStartup
socket
htons
connect
send
WSAAsyncSelect
kernel32
FreeLibrary
LocalFree
MapViewOfFile
CloseHandle
UnmapViewOfFile
GetCurrentProcess
GetVersionExA
GetTickCount
CopyFileA
GetSystemDirectoryA
GetModuleHandleA
SetFileTime
CreateFileMappingA
CreateFileA
GetFileTime
LoadLibraryA
GetFileAttributesA
FindClose
FindNextFileA
FindFirstFileA
GetDriveTypeA
GetLastError
CreateMutexA
DeleteFileA
ExitProcess
GetModuleFileNameA
SetPriorityClass
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateThread
WriteFile
Sleep
ResumeThread
CreateProcessA
ExpandEnvironmentStringsA
GetTempPathA
MoveFileA
GlobalMemoryStatus
GetComputerNameA
GetCurrentProcessId
HeapAlloc
GetProcAddress
GetStartupInfoA
GetCommandLineA
SetFileAttributesA
GetProcessHeap
user32
wsprintfA
DefWindowProcA
ExitWindowsEx
PostQuitMessage
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
SendMessageA
GetMessageA
TranslateMessage
DispatchMessageA
advapi32
OpenServiceA
ChangeServiceConfigA
StartServiceA
OpenSCManagerA
SetSecurityInfo
SetEntriesInAclA
QueryServiceStatus
ControlService
CloseServiceHandle
RegOpenKeyExA
RegRestoreKeyA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceCtrlDispatcherA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetSecurityInfo
msvcp60
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
msvcrt
sprintf
memmove
_stricmp
strstr
_itoa
srand
rand
fopen
atoi
strncpy
strcspn
__CxxFrameHandler
printf
fprintf
malloc
_strlwr
fclose
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.feerst0 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 528B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ