Static task
static1
Behavioral task
behavioral1
Sample
2dcd1332ca5e2c5ce5172b7dfa8b9d48_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2dcd1332ca5e2c5ce5172b7dfa8b9d48_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2dcd1332ca5e2c5ce5172b7dfa8b9d48_JaffaCakes118
-
Size
46KB
-
MD5
2dcd1332ca5e2c5ce5172b7dfa8b9d48
-
SHA1
d25d329bda4947a8edb137ce14785b295cf83d68
-
SHA256
50986e3c90639bb1f1c0686ca07cade21531f6fe5eba73b959e39f8fa496d85c
-
SHA512
07f948632a76db96f17a6ac254b8aff245c47376c51f576213c65bf592bfb6d763be42b5ca5be8438cf42da804138f1e50d3388f54ae75dac396caea0ac6b548
-
SSDEEP
768:ZEBX62aXK/Fx/K6AC849U6NskJ6r6hZKG6jDI3jdQGlwZGXMfw9bQ:ax62aXK7/TN/Jk0KGeDyvXMfy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2dcd1332ca5e2c5ce5172b7dfa8b9d48_JaffaCakes118
Files
-
2dcd1332ca5e2c5ce5172b7dfa8b9d48_JaffaCakes118.exe windows:4 windows x86 arch:x86
2046353035091f662917813a93837ec4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetModuleFileNameExA
EnumProcesses
EnumProcessModules
GetModuleBaseNameA
kernel32
CreateFileA
Sleep
DeleteFileA
LocalFree
WideCharToMultiByte
lstrlenW
GetCommandLineW
ExitProcess
GetLastError
CreateMutexA
GetVolumeInformationA
GetTempFileNameA
GetModuleFileNameA
GetTempPathA
GetUserDefaultLangID
GetCurrentProcess
FindClose
FindNextFileA
GetFileTime
lstrcmpiA
OpenProcess
TerminateProcess
ReleaseMutex
WaitForSingleObject
ExpandEnvironmentStringsA
SetCurrentDirectoryA
lstrcpynA
Process32Next
MoveFileExA
Process32First
CreateToolhelp32Snapshot
GetTickCount
lstrlenA
GetStartupInfoA
GetModuleHandleA
CloseHandle
SetFileTime
GetFileAttributesA
GetProcAddress
lstrcpyA
lstrcatA
LoadLibraryA
FindFirstFileA
user32
ExitWindowsEx
wsprintfA
advapi32
AdjustTokenPrivileges
OpenSCManagerA
OpenServiceA
CloseServiceHandle
ChangeServiceConfigA
ControlService
DeleteService
RegDeleteKeyA
OpenProcessToken
LookupPrivilegeValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHGetFolderPathA
CommandLineToArgvW
ws2_32
inet_addr
accept
WSAGetLastError
recv
gethostbyname
inet_ntoa
listen
bind
htons
gethostname
ioctlsocket
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
netapi32
NetShareEnum
NetApiBufferFree
msvcrt
strcat
abs
strrchr
strcmp
_strcmpi
_strdup
free
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
time
atoi
printf
strcpy
sscanf
strlen
_except_handler3
toupper
strstr
malloc
fclose
ftell
fseek
fopen
fwrite
fputs
fread
memset
system
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE