Static task
static1
Behavioral task
behavioral1
Sample
14c078b4f1204188f65d35ca8a82187a_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
14c078b4f1204188f65d35ca8a82187a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
14c078b4f1204188f65d35ca8a82187a_JaffaCakes118
-
Size
632KB
-
MD5
14c078b4f1204188f65d35ca8a82187a
-
SHA1
ed10deb832b328ccff4fd55a695b74c63a77672a
-
SHA256
15447f465042d11350eca3b88d074d99e57c237aabde4aac5a39455e8d4b1392
-
SHA512
c652118b0b1b12c59181d2bf636b90d367979c8350f485aa2d2e2d8fe9050806b9b5eae41d05cd49639e691f1a15e68c36a3fab36e074f83965d26065aa879ff
-
SSDEEP
12288:x2tNT1fwSMXd4EPZGNFBOEmQdfusJtx9/mTKtN1D:xPS+f+RJdfusJtx9/mgR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14c078b4f1204188f65d35ca8a82187a_JaffaCakes118
Files
-
14c078b4f1204188f65d35ca8a82187a_JaffaCakes118.exe windows:4 windows x86 arch:x86
f840441a7aba67f8a7d443b30763a735
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSACleanup
WSAStartup
shutdown
sendto
send
recvfrom
recv
htons
getservbyport
getservbyname
ntohs
getprotobynumber
getprotobyname
getpeername
gethostname
gethostbyname
gethostbyaddr
inet_addr
inet_ntoa
listen
getsockname
bind
accept
getsockopt
setsockopt
socket
select
__WSAFDIsSet
ioctlsocket
connect
closesocket
WSAGetLastError
user32
WaitForInputIdle
EnumWindows
GetWindowThreadProcessId
SetForegroundWindow
BringWindowToTop
shell32
SHGetFolderPathA
ShellExecuteA
advapi32
RegSetValueExA
RegQueryInfoKeyA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
kernel32
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
LCMapStringW
LCMapStringA
SetEndOfFile
RtlUnwind
RaiseException
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
CompareStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapSize
VirtualAlloc
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetFileAttributesA
InitializeCriticalSection
GetTimeZoneInformation
SetCurrentDirectoryA
GetCurrentDirectoryA
GetFullPathNameA
CompareStringW
SetEnvironmentVariableA
SetFileAttributesA
RemoveDirectoryA
DeleteFileA
GetCommandLineA
CreateProcessA
GetVersionExA
GetLastError
CloseHandle
GetTickCount
Sleep
DuplicateHandle
GetCurrentProcess
FormatMessageA
GetProcAddress
GetModuleHandleA
SetFilePointer
LockFileEx
UnlockFileEx
CreateFileA
CreatePipe
ReadFile
MoveFileA
MoveFileExA
WriteFile
GetStartupInfoA
FindFirstFileA
FindNextFileA
FindClose
GetExitCodeProcess
WaitForSingleObject
SearchPathA
LoadLibraryA
LoadLibraryExA
FreeLibrary
SetConsoleCtrlHandler
VirtualProtect
VirtualQuery
GetSystemInfo
SetUnhandledExceptionFilter
GetCurrentProcessId
GetLocalTime
SetEnvironmentVariableW
HeapFree
HeapAlloc
GetProcessHeap
GetSystemTimeAsFileTime
CreateDirectoryA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
GetFileInformationByHandle
PeekNamedPipe
GetFileType
SetStdHandle
EnterCriticalSection
LeaveCriticalSection
ExitProcess
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
HeapReAlloc
InterlockedIncrement
InterlockedDecrement
MultiByteToWideChar
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
Sections
.text Size: 432KB - Virtual size: 430KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 132KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE