Static task
static1
Behavioral task
behavioral1
Sample
30198ab1d0e545d611fb60ad4b699bad_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
30198ab1d0e545d611fb60ad4b699bad_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
30198ab1d0e545d611fb60ad4b699bad_JaffaCakes118
-
Size
32KB
-
MD5
30198ab1d0e545d611fb60ad4b699bad
-
SHA1
dcf36088dec31b1bb94e3612d6ceae1c4ffc71ae
-
SHA256
27bcf608bed55b936ce8e33c7fbdf4efd7b7a3ac2c797ea6423ff4c231dfc6aa
-
SHA512
08617eb55cd86a0a4aa37c8d83774d147e63ae7e6a9dbc51d611a8d4a2db8196c8def76b7fa836ffff2212f6f6ce075b49e92d9528ab3726d749819fcc028645
-
SSDEEP
384:cmVVi5DCdmpxSAHgUt1vNixaXERU/MDU1JNWFnrn6kyc9f/3ZQh:1VViCYVQ2Mo1JNWBr6tc9W
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30198ab1d0e545d611fb60ad4b699bad_JaffaCakes118
Files
-
30198ab1d0e545d611fb60ad4b699bad_JaffaCakes118.exe windows:4 windows x86 arch:x86
fae13a4d81bfc3e0744c05b5ede6f048
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalMemoryStatus
lstrcpyA
GetVersionExA
GetComputerNameA
GetProcAddress
LoadLibraryA
ResumeThread
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
OpenProcess
lstrcatA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
lstrlenA
GetLastError
SetFileAttributesA
CopyFileA
GetSystemDirectoryA
GetModuleHandleA
GetStartupInfoA
TerminateProcess
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
GetProcessHeap
HeapAlloc
GetTickCount
GetCurrentProcessId
CreateThread
ExitThread
Sleep
TerminateThread
GetCurrentProcess
CloseHandle
user32
wsprintfA
advapi32
StartServiceA
RegOpenKeyA
RegSetValueExA
CloseServiceHandle
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
DeleteService
CreateServiceA
mfc42
ord540
ord800
ord6877
ord939
ord2818
ord4278
ord860
ord6663
ord858
ord535
ord922
ord924
ord926
ord537
ord4129
ord2764
ord6648
msvcrt
exit
malloc
strstr
strncmp
_except_handler3
__dllonexit
_onexit
_exit
_XcptFilter
__CxxFrameHandler
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
time
srand
rand
atoi
_acmdln
msvcp60
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
ws2_32
connect
htons
inet_addr
socket
sendto
inet_ntoa
closesocket
WSASocketA
WSAStartup
htonl
send
WSAGetLastError
recv
gethostbyname
setsockopt
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ