Static task
static1
Behavioral task
behavioral1
Sample
4d0d12f8c4f94be061613612a2b6e0ab_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4d0d12f8c4f94be061613612a2b6e0ab_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4d0d12f8c4f94be061613612a2b6e0ab_JaffaCakes118
-
Size
108KB
-
MD5
4d0d12f8c4f94be061613612a2b6e0ab
-
SHA1
64f72d587426cde27c503c47004565cbae5dd1e7
-
SHA256
847cb35b4c84c4c8439938c4a7605b3bdce76be7a955bd0572af6d31a6dba6ed
-
SHA512
fffddcd827b4e3ba15d5a8667941b3c8eda00722e618f73cfb1c97ba115790a9f01d188e15d94ae6a82b38e7c6a690432563e95a8ab78d845f9db29f3d399041
-
SSDEEP
1536:8hSlpt/1hKrtHGoWPW4oZrIwOEmso4dYYDpHkM1Xo4hu:8hSlj7ctH+WiV4dYYDpED4Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d0d12f8c4f94be061613612a2b6e0ab_JaffaCakes118
Files
-
4d0d12f8c4f94be061613612a2b6e0ab_JaffaCakes118.exe windows:4 windows x86 arch:x86
5f738050b71f6f8d86883f4f00864702
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
bind
htons
sendto
gethostbyname
inet_ntoa
socket
closesocket
WSAAsyncSelect
connect
WSAGetLastError
send
recv
select
setsockopt
WSASocketA
WSAEnumProtocolsA
WSAStartup
WSACloseEvent
WSASend
WSAGetOverlappedResult
WSAResetEvent
WSAWaitForMultipleEvents
WSACreateEvent
WSASetLastError
inet_addr
gethostname
mfc42
ord1168
ord6139
ord287
ord1175
ord4058
ord3181
ord2781
ord5856
ord4278
ord2764
ord941
ord3319
ord1980
ord536
ord3178
ord640
ord2414
ord2405
ord5785
ord1640
ord323
ord2860
ord4204
ord5710
ord3311
ord2614
ord5683
ord3318
ord5773
ord5186
ord354
ord3790
ord926
ord1105
ord6648
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord610
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord815
ord641
ord2514
ord2621
ord1247
ord3874
ord2864
ord5355
ord2393
ord5265
ord4376
ord4853
ord4998
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord1576
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord3597
ord1146
ord324
ord4234
ord6199
ord4299
ord4710
ord2379
ord755
ord470
ord6215
ord1158
ord2919
ord5572
ord924
ord356
ord2770
ord353
ord5442
ord1979
ord665
ord668
ord5356
ord6385
ord4129
ord939
ord2818
ord268
ord389
ord5207
ord1988
ord690
ord1567
ord823
ord3229
ord5204
ord6881
ord6657
ord3811
ord825
ord540
ord537
ord858
ord800
ord860
ord535
ord922
ord2915
ord5302
ord6376
msvcrt
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
?terminate@@YAXXZ
_except_handler3
??1type_info@@UAE@XZ
realloc
_initterm
strchr
strncpy
atof
atoi
strncmp
isalpha
strstr
sprintf
_splitpath
_stricmp
free
malloc
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_ftol
_controlfp
__CxxFrameHandler
_setmbcp
kernel32
GetVolumeInformationA
GetSystemDirectoryA
GetTempPathA
Sleep
GetDriveTypeA
GetLastError
CloseHandle
CreateFileA
DeleteFileA
SetFileAttributesA
SetVolumeLabelA
GetModuleFileNameA
OpenProcess
GetLongPathNameA
GetWindowsDirectoryA
GetProcAddress
GetModuleHandleA
CreateMutexA
CopyFileA
WinExec
GetLocalTime
GetCurrentProcess
GetCurrentThread
TerminateThread
GetExitCodeThread
FreeLibrary
FileTimeToSystemTime
FileTimeToLocalFileTime
LoadLibraryA
GlobalMemoryStatus
GetComputerNameA
GetVersionExA
GetStartupInfoA
CreateDirectoryA
GetDiskFreeSpaceExA
user32
PostMessageA
GetWindow
GetDesktopWindow
GetIconInfo
SetTimer
SetWindowLongA
DestroyIcon
SendMessageA
DrawIcon
mouse_event
keybd_event
EnableWindow
KillTimer
IsIconic
GetSystemMetrics
GetDC
LoadIconA
GetClientRect
gdi32
GetPixel
BitBlt
GetDIBits
GetDeviceCaps
CreateCompatibleBitmap
SelectObject
DeleteDC
DeleteObject
GetObjectA
GetBitmapBits
CreateDCA
CreateCompatibleDC
advapi32
RegQueryValueExA
GetUserNameA
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegCloseKey
shell32
SHGetSpecialFolderPathA
SHFileOperationA
ExtractIconExA
ShellExecuteA
SHGetFileInfoA
psapi
EnumProcesses
GetModuleFileNameExA
EnumProcessModules
GetModuleBaseNameA
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ