Static task
static1
Behavioral task
behavioral1
Sample
492530551ffc858516e9aa61478f0e9b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
492530551ffc858516e9aa61478f0e9b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
492530551ffc858516e9aa61478f0e9b_JaffaCakes118
-
Size
40KB
-
MD5
492530551ffc858516e9aa61478f0e9b
-
SHA1
432c4370190acafe128a45044f5dcf983b6d1066
-
SHA256
9a9075268f10402232e825c5b9497ea160cfc78d93dfb5d05b97fa663e281d25
-
SHA512
c550fd05da1d48b7cb2e40c00e90bbe2ec95e496b513f39ac471c2fa520e7ce58ea30794bbc1a70e8301f0f70dfb2f368c7702e3827f3ffb6616f8fbea432f55
-
SSDEEP
768:0hiAX5maCi3zmQnII2Fy4JyxJhqJPK+5+SQo:0FSk4MxJhqJFQo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 492530551ffc858516e9aa61478f0e9b_JaffaCakes118
Files
-
492530551ffc858516e9aa61478f0e9b_JaffaCakes118.exe windows:4 windows x86 arch:x86
62c6810ff04718f1a92c25dd7295a1d4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
DeleteUrlCacheEntry
mfc42
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord2982
ord3147
ord3259
ord4465
ord3136
ord2396
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord815
ord4160
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord4673
ord4202
ord3790
ord6153
ord3811
ord1158
ord823
ord860
ord941
ord356
ord535
ord858
ord537
ord924
ord922
ord1168
ord2770
ord1140
ord2764
ord2818
ord668
ord825
ord540
ord800
ord3262
ord1576
msvcrt
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
?terminate@@YAXXZ
_except_handler3
_purecall
__p___argc
__p___argv
_stricmp
malloc
time
srand
rand
atoi
__CxxFrameHandler
_setmbcp
_controlfp
kernel32
GetStartupInfoA
GetModuleHandleA
CreateToolhelp32Snapshot
Process32First
CloseHandle
OpenProcess
Process32Next
GetExitCodeProcess
Sleep
GetTickCount
DeleteFileA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetModuleFileNameA
ExpandEnvironmentStringsA
GetWindowsDirectoryA
GetSystemDirectoryA
TerminateProcess
advapi32
RegisterServiceCtrlHandlerA
OpenServiceA
ControlService
QueryServiceStatus
DeleteService
OpenSCManagerA
CreateServiceA
CloseServiceHandle
ChangeServiceConfig2A
StartServiceCtrlDispatcherA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
SetServiceStatus
shell32
ShellExecuteA
urlmon
URLDownloadToFileA
wsock32
WSAStartup
closesocket
socket
sendto
select
gethostbyname
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 908B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ