Static task
static1
Behavioral task
behavioral1
Sample
0f0ec23892da6ad8f26dd831602f6e31_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0f0ec23892da6ad8f26dd831602f6e31_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0f0ec23892da6ad8f26dd831602f6e31_JaffaCakes118
-
Size
86KB
-
MD5
0f0ec23892da6ad8f26dd831602f6e31
-
SHA1
2a9050e52138aafd8fcb52bb9d921be39bd28155
-
SHA256
30d8c53399011aac07b84db98786b9bcac1a23b0cc231793998a81e865c4b1ca
-
SHA512
976184f7b03fb939ef7bfe9b3ff9d7976bd5b21c1124b58c4940c0d3e5be5294e13ed3b18d7b6d0e289e257d0f58c18a181e8aacfd029e4c097a65246da64243
-
SSDEEP
1536:VBDQm824trMueQlTb9nAmsVlarzMue9DnxWbUJhG:jDQi4trGQl1f+arIue9DsUJhG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f0ec23892da6ad8f26dd831602f6e31_JaffaCakes118
Files
-
0f0ec23892da6ad8f26dd831602f6e31_JaffaCakes118.exe windows:4 windows x86 arch:x86
f2616f429ac864bcda4728db23065c6b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
ChangeServiceConfig2A
CloseServiceHandle
CreateServiceA
DeleteService
OpenSCManagerA
OpenServiceA
QueryServiceStatus
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceA
StartServiceCtrlDispatcherA
kernel32
AddAtomA
CloseHandle
CreateEventA
CreateFileA
CreateSemaphoreA
CreateThread
CreateToolhelp32Snapshot
ExitProcess
FindAtomA
FindResourceA
FreeLibrary
GetAtomNameA
GetComputerNameA
GetCurrentThreadId
GetFileAttributesA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
LoadResource
LocalAlloc
LockResource
OpenProcess
Process32First
Process32Next
ReadProcessMemory
ReleaseSemaphore
SetEvent
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualProtect
VirtualQuery
WaitForSingleObject
WriteFile
lstrcmpiA
lstrcpyA
lstrlenA
msvcrt
_write
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_isctype
_onexit
_pctype
_setmode
abort
atexit
atoi
exit
free
getenv
malloc
memchr
memcmp
memcpy
memmove
rand
signal
sprintf
strchr
strcmp
strcpy
strerror
strncmp
user32
CloseClipboard
FindWindowA
GetAsyncKeyState
GetClipboardData
GetWindowThreadProcessId
OpenClipboard
ws2_32
WSACleanup
WSAStartup
closesocket
connect
gethostbyname
htons
inet_addr
inet_ntoa
recv
send
socket
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 18KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 108B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE