Static task
static1
Behavioral task
behavioral1
Sample
2703ac84ba08ab3715505c9e1a58f9ca_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2703ac84ba08ab3715505c9e1a58f9ca_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2703ac84ba08ab3715505c9e1a58f9ca_JaffaCakes118
-
Size
43KB
-
MD5
2703ac84ba08ab3715505c9e1a58f9ca
-
SHA1
e9d3d9ab9298febd59a1306d58d97b0116b0ecfc
-
SHA256
1c7c9fa4d62831f4472d35253fbf18ff45cf77b785060802b57dfaf3ecbaf8f8
-
SHA512
87c6e75f672df2edeea109eeebba6758bad9e5a8a292635444f06a3ea966b1ee64aa606993d9d2dbaf4617a5d352e4ccfb5d39c0ee3e7d037acaa70940e386e6
-
SSDEEP
768:43TKhEmoMt9ztrQYSNyLTCWzdMw41RcoKxXYZXO:43uP9ztrTCwywoKxXH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2703ac84ba08ab3715505c9e1a58f9ca_JaffaCakes118
Files
-
2703ac84ba08ab3715505c9e1a58f9ca_JaffaCakes118.exe windows:4 windows x86 arch:x86
7aba07606ff498bd9977905a960b754e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSAStartup
socket
gethostbyname
htons
connect
send
closesocket
WSACleanup
kernel32
GetVolumeInformationA
SetErrorMode
CreateFileMappingA
GetStartupInfoA
GetModuleHandleA
GetLastError
CreateThread
ExitProcess
GetTickCount
lstrlenA
lstrcatA
lstrcpyA
LoadLibraryA
GetProcAddress
GetTempFileNameA
Sleep
GetModuleFileNameA
GetTempPathA
MoveFileExA
CreateProcessA
msvcrt
_controlfp
_strdup
_unlink
strcpy
sprintf
atoi
fclose
ftell
fseek
fopen
toupper
fread
_strcmpi
calloc
_except_handler3
malloc
fwrite
fputs
strlen
strcat
rand
strstr
strrchr
strcmp
memset
strtok
srand
__argv
__argc
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
Sections
.bss Size: - Virtual size: 26KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE