Static task
static1
Behavioral task
behavioral1
Sample
4e00a10fd2c52bcf5ab44de01a8c799a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4e00a10fd2c52bcf5ab44de01a8c799a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4e00a10fd2c52bcf5ab44de01a8c799a_JaffaCakes118
-
Size
63KB
-
MD5
4e00a10fd2c52bcf5ab44de01a8c799a
-
SHA1
66a31b52a42932f8a5c5d2a05ccafdc14cef8d09
-
SHA256
9e8687816417860728ee1f5a39e1dea15ddcf94077e56a2b251003c93ad383b1
-
SHA512
8f0b5ae8de3a57b45875bfe1ca68d53aaabcd7d5338beef43519ac17c84ab516913368b121f74f0458ce315d46fa5a264b3600bdb2f5d03bca3a8dd4efca82c8
-
SSDEEP
1536:tkncr/k/Tz09RPiph9T6LoSC+aQ5oD5+T5VEbllm:qcrM/H09oh96sp+aQAYTIblM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4e00a10fd2c52bcf5ab44de01a8c799a_JaffaCakes118
Files
-
4e00a10fd2c52bcf5ab44de01a8c799a_JaffaCakes118.exe windows:1 windows x86 arch:x86
bd4148ee333e7cc0533aeb4aa74b8014
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSAAsyncSelect
WSAGetLastError
WSAStartup
__WSAFDIsSet
accept
bind
closesocket
connect
gethostbyname
htonl
htons
inet_addr
ioctlsocket
listen
recv
select
send
socket
ole32
CoCreateInstance
CLSIDFromString
CoTaskMemFree
CoInitialize
CoUninitialize
oleaut32
SysAllocString
kernel32
ExitThread
ExpandEnvironmentStringsA
FindFirstFileA
FindNextFileA
FreeLibrary
GetCommandLineA
GetComputerNameA
GetCurrentProcessId
GetCurrentThreadId
GetDiskFreeSpaceExA
GetDriveTypeA
GetExitCodeThread
GetFileSize
GetFileTime
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetProcAddress
GetSystemDirectoryA
GetTempPathA
GetTickCount
GetVersion
GetVersionExA
GetVolumeInformationA
GetWindowsDirectoryA
GlobalMemoryStatus
CopyFileA
InterlockedIncrement
IsBadReadPtr
IsBadWritePtr
LoadLibraryA
LocalAlloc
LocalFree
OpenMutexA
OpenProcess
CreateFileA
ReadFile
ReadProcessMemory
RtlUnwind
SetFilePointer
SetFileTime
SetUnhandledExceptionFilter
CreateMutexA
Sleep
TerminateProcess
TerminateThread
VirtualQuery
CreateProcessA
WaitForSingleObject
WideCharToMultiByte
WinExec
WriteFile
WriteProcessMemory
lstrlenA
lstrlenW
CreateThread
DeleteFileA
user32
SetWindowTextA
GetWindowTextA
FindWindowA
GetForegroundWindow
SetTimer
KillTimer
RegisterClassA
GetMessageA
CreateDesktopA
SetThreadDesktop
GetThreadDesktop
TranslateMessage
DispatchMessageA
SendMessageA
CharUpperBuffA
CreateWindowExA
DefWindowProcA
advapi32
GetUserNameA
CloseServiceHandle
CreateServiceA
DeleteService
OpenSCManagerA
OpenServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceA
StartServiceCtrlDispatcherA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
GetSecurityInfo
SetSecurityInfo
SetEntriesInAclA
crtdll
_itoa
__GetMainArgs
_sleep
atoi
exit
memcpy
memmove
memset
raise
rand
signal
sprintf
srand
strcat
strchr
Sections
.text Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 783KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE