Static task
static1
Behavioral task
behavioral1
Sample
17fa820c16393055c693e49790b2184b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17fa820c16393055c693e49790b2184b_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
17fa820c16393055c693e49790b2184b_JaffaCakes118
-
Size
272KB
-
MD5
17fa820c16393055c693e49790b2184b
-
SHA1
5e2641598f61417f3937f1fd022cd756478163d4
-
SHA256
f6dee9cb7ded9f194ba7a777c061109135cc129a7adfeb74ec9b98445a740307
-
SHA512
842068e8fb1af8f964efcb160e9f3d0b26d18b8b2616e15228444bb3aad71e29fe0a7f09d640711061dea0750a89bfbe2f90e53f0f1068453b134922697efbcf
-
SSDEEP
6144:PdPj5ZyYeljU4vRH37fX5EqrNJiEaHXYroDqkHI7alhyLhObYYvk86LO:c7o4v9qaNE1Xtqko7vYvG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17fa820c16393055c693e49790b2184b_JaffaCakes118
Files
-
17fa820c16393055c693e49790b2184b_JaffaCakes118.exe windows:4 windows x86 arch:x86
d39711505d9462c0d7251a937338b688
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_iob
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
sprintf
isdigit
calloc
printf
perror
_errno
strerror
fflush
sscanf
wcstombs
__p__fmode
wcscpy
memchr
_except_handler3
fprintf
__CxxFrameHandler
toupper
fputc
wcscat
strtok
_ftol
rand
srand
fwrite
ftell
malloc
free
strcat
exit
strncmp
atof
strchr
_memccpy
_stricmp
strncat
memcmp
_controlfp
mbstowcs
system
atoi
strcpy
fgets
strcmp
memmove
memcpy
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
_CxxThrowException
??0exception@@QAE@ABV0@@Z
_vsnprintf
strlen
strncpy
fopen
fclose
fseek
fread
memset
strstr
??2@YAPAXI@Z
_purecall
??3@YAXPAX@Z
_EH_prolog
__set_app_type
_strdup
msvcp60
?_Xran@std@@YAXXZ
?_Xlen@std@@YAXXZ
kernel32
GetStartupInfoA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GetCurrentThread
GetCurrentProcess
CreateEventA
GetTempPathA
GetLastError
GetModuleFileNameA
OpenProcess
GetModuleHandleA
CreateThread
TerminateThread
FreeConsole
AllocConsole
GetStdHandle
WriteFile
CreateNamedPipeA
WaitNamedPipeA
CreateFileA
TerminateProcess
CloseHandle
ReadFile
GlobalMemoryStatus
GetVersionExA
GetComputerNameA
ExpandEnvironmentStringsA
CreateProcessA
GetSystemDirectoryA
ExitProcess
DeleteFileA
LoadLibraryA
GetProcAddress
FreeLibrary
Sleep
GetTickCount
CopyFileA
user32
GetAsyncKeyState
wsprintfA
GetForegroundWindow
GetKeyState
ExitWindowsEx
GetWindowTextA
advapi32
RegQueryInfoKeyA
RegEnumKeyExA
DeleteService
ControlService
EnumServicesStatusA
RegQueryValueExA
OpenThreadToken
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceA
OpenServiceA
OpenSCManagerA
CreateServiceA
CloseServiceHandle
ChangeServiceConfig2A
RegCreateKeyExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetUserNameA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegDeleteValueA
shell32
ShellExecuteA
ws2_32
inet_ntoa
gethostbyaddr
ntohs
WSAIoctl
gethostname
gethostbyname
setsockopt
WSASocketA
ntohl
getsockopt
recvfrom
getservbyname
shutdown
ioctlsocket
getpeername
getsockname
send
recv
__WSAFDIsSet
accept
bind
listen
closesocket
socket
htons
connect
WSAGetLastError
select
WSACleanup
WSAStartup
htonl
inet_addr
sendto
netapi32
NetUseDel
NetApiBufferFree
NetShareEnum
NetUserEnum
NetScheduleJobAdd
NetRemoteTOD
NetUseAdd
psapi
GetModuleBaseNameA
EnumProcesses
EnumProcessModules
dnsapi
DnsQuery_A
Sections
.text Size: 172KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hbclpvv Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE