Static task
static1
Behavioral task
behavioral1
Sample
4c10a1efed25b828e4785d9526507fbc_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4c10a1efed25b828e4785d9526507fbc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4c10a1efed25b828e4785d9526507fbc_JaffaCakes118
-
Size
40KB
-
MD5
4c10a1efed25b828e4785d9526507fbc
-
SHA1
51ae5dd089fe2c186098f8028003f1e03ba29e0c
-
SHA256
e3de8f876b8b8be249f7ab3d5d097dd66d8206f5735f4cdf72187bc5c7c61811
-
SHA512
c14119c675d69ba6894f5b656ad53bbfe7f1c6df7d445cddf703898c20ee8e6b744d5b9ff419924c455272162d4ae1360615451273084e1a32299e9aa202b06a
-
SSDEEP
768:0esSrA236dmKUUBSjlElHNrnnyxDlG5pP9C746pb0IUUiM95Zdz:0ePrARmKGEltrnyxhGgtyIVJ9xz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c10a1efed25b828e4785d9526507fbc_JaffaCakes118
Files
-
4c10a1efed25b828e4785d9526507fbc_JaffaCakes118.exe windows:4 windows x86 arch:x86
36cd18b8a68a3395298928db7b194226
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
SetSecurityInfo
SetEntriesInAclA
AdjustTokenPrivileges
LookupPrivilegeValueA
GetTokenInformation
OpenProcessToken
GetUserNameA
LookupAccountSidA
RegEnumKeyExA
RegEnumValueA
wsock32
gethostbyname
gethostname
inet_addr
ioctlsocket
socket
inet_ntoa
htons
select
closesocket
recv
WSAStartup
WSACleanup
WSAGetLastError
mpr
WNetCloseEnum
shlwapi
SHSetValueA
SHDeleteKeyA
netapi32
NetGetDCName
NetApiBufferFree
shell32
SHGetSpecialFolderPathA
msvcrt
_strnicmp
fclose
fread
fseek
fopen
fwrite
swprintf
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
strcmp
memcpy
strchr
atoi
memset
exit
sprintf
strrchr
time
srand
rand
strcpy
strlen
_EH_prolog
__CxxFrameHandler
strcat
strstr
rename
_controlfp
free
malloc
_itoa
kernel32
GetStartupInfoA
GetModuleHandleA
PeekNamedPipe
ReadFile
CreateProcessA
MultiByteToWideChar
GlobalAlloc
GlobalFree
GetFileTime
GetCurrentProcess
DuplicateHandle
SetFileTime
GetSystemTime
SystemTimeToFileTime
CompareFileTime
GetFileSize
GetLocalTime
RemoveDirectoryA
FindClose
LocalFree
GetLogicalDriveStringsA
GetDriveTypeA
GetVolumeInformationA
GetComputerNameA
GetSystemDefaultLangID
GetPriorityClass
OpenMutexA
lstrcmpiA
WaitForSingleObject
CreateMutexA
GetFileAttributesA
CopyFileA
LoadLibraryA
GetProcAddress
GetLastError
WinExec
DeleteFileA
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ