Static task
static1
Behavioral task
behavioral1
Sample
22a4c2a0f67c80a266cadf796864b679_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
22a4c2a0f67c80a266cadf796864b679_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
22a4c2a0f67c80a266cadf796864b679_JaffaCakes118
-
Size
164KB
-
MD5
22a4c2a0f67c80a266cadf796864b679
-
SHA1
cccfc035c082eb0b061c91a074ef15f77966abcc
-
SHA256
9e30e592470c86295680e07b627d00fdcc69d8665b0a4c90301833d48ec5b1b9
-
SHA512
8af628b59cd1983cd619993a3b5e31e1320ba214da6dd790c8da50d2c25d812eec6bb02796c1e959a7c769ac5f2b70e4e5b077fa0d84228bdd270bdba26e962c
-
SSDEEP
3072:mcOFyVjVFNCeqcus8Qr4QTw/Y7Il6rE4jC+ivhG2aitawc:mc+y95qrs54Qz7Ilxr+iMj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 22a4c2a0f67c80a266cadf796864b679_JaffaCakes118
Files
-
22a4c2a0f67c80a266cadf796864b679_JaffaCakes118.exe windows:4 windows x86 arch:x86
9bd24fe4dafab196024ec64b5f16ca78
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDiskFreeSpaceA
GetCurrentThreadId
RemoveDirectoryA
GetProfileStringW
lstrlenA
lstrcmpiA
CreateProcessA
winspool.drv
GetJobA
DocumentPropertiesA
OpenPrinterA
ClosePrinter
ws2_32
socket
getpeername
shutdown
setsockopt
sendto
getsockname
gethostbyname
htons
version
GetFileVersionInfoSizeA
VerQueryValueA
msvcrt
__dllonexit
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
localtime
_onexit
atoi
strncmp
fclose
fread
fseek
fopen
memcmp
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 186KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ