Static task
static1
Behavioral task
behavioral1
Sample
37e568bed4ae057e548439dc811b4d3a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
37e568bed4ae057e548439dc811b4d3a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
37e568bed4ae057e548439dc811b4d3a_JaffaCakes118
-
Size
40KB
-
MD5
37e568bed4ae057e548439dc811b4d3a
-
SHA1
066d06ac08b48d3382d46bbeda6ad411b6d6130e
-
SHA256
31a1336f9998313bc33db0bb58ba1c8de5d6d806471f8a3252c858ab073cdd07
-
SHA512
5daabe23256df3eef9e06fc5e2ad93de97550d9354699467e4728d579013892ea4da7bb0e1584d46df790703d055895f61781b5947be00b6605d44a7f7770b16
-
SSDEEP
768:OIsd/SfHchRAUWFqYSvo5JXWWQPu79jyumg28xDW3noNyhgQ6pa0IUUiM95Zxp:lsd/SfchRAUWFqFvo5V997mg28xqgy8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 37e568bed4ae057e548439dc811b4d3a_JaffaCakes118
Files
-
37e568bed4ae057e548439dc811b4d3a_JaffaCakes118.exe windows:4 windows x86 arch:x86
174a34cdd32e45ef832fb3ef78f92d61
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
SetSecurityInfo
SetEntriesInAclA
AdjustTokenPrivileges
LookupPrivilegeValueA
GetTokenInformation
OpenProcessToken
GetUserNameA
LookupAccountSidA
RegEnumKeyExA
RegEnumValueA
ws2_32
gethostname
gethostbyname
WSAGetLastError
inet_ntoa
inet_addr
ioctlsocket
htons
connect
select
closesocket
recv
WSAStartup
WSACleanup
socket
mpr
WNetCloseEnum
shlwapi
SHDeleteKeyA
SHSetValueA
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
swprintf
fwrite
fopen
fseek
fread
rename
_strnicmp
strcmp
sprintf
memcpy
strstr
strchr
atoi
memset
strrchr
time
srand
rand
strlen
strcpy
strcat
malloc
_EH_prolog
__CxxFrameHandler
fclose
free
_itoa
kernel32
GetStartupInfoA
GetModuleHandleA
PeekNamedPipe
ReadFile
CreateProcessA
MultiByteToWideChar
GlobalAlloc
GlobalFree
GetFileTime
GetFileSize
GetLocalTime
SetFileTime
GetSystemTime
SystemTimeToFileTime
RemoveDirectoryA
FindNextFileA
FindFirstFileA
FindClose
GetPriorityClass
OpenProcess
GetCurrentProcess
DuplicateHandle
GetLastError
LocalFree
CreateToolhelp32Snapshot
Process32First
Process32Next
GetLogicalDriveStringsA
GetDriveTypeA
GetVolumeInformationA
GetSystemDirectoryA
CompareFileTime
GetComputerNameA
TerminateProcess
CreateFileA
WriteFile
GetVersionExA
GetSystemDefaultLangID
OpenMutexA
CloseHandle
lstrcmpiA
ExitProcess
SetEvent
WaitForSingleObject
Sleep
CreateMutexA
DeleteFileA
GetWindowsDirectoryA
CreateDirectoryA
GetFileAttributesA
SetFileAttributesA
CopyFileA
LoadLibraryA
GetProcAddress
FreeLibrary
CreateEventA
CreateThread
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ