Static task
static1
Behavioral task
behavioral1
Sample
5cb66da5daaab721a733d039c3671582_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5cb66da5daaab721a733d039c3671582_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5cb66da5daaab721a733d039c3671582_JaffaCakes118
-
Size
8KB
-
MD5
5cb66da5daaab721a733d039c3671582
-
SHA1
47ee3599482759eaa8cbd93b6b613385ac936c93
-
SHA256
c71485042e98cd49f1c9832b930c8d15dc9ce8dd27910c015f88b0aab7c6cecc
-
SHA512
bb77f3ae386ade4f4fc0c637e0df65b9e225e6d419d49cfce9ef36e1980083404484702a7a697d0425ff1b3567a037e80c133e50f3102d867e2d53bc4c67125d
-
SSDEEP
96:nPHVjubqm7mM1Uj/DD4BSv6ndM+ik2MXJFHEJWR7:n/V6um75s/v6nk2XJhEJWR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5cb66da5daaab721a733d039c3671582_JaffaCakes118
Files
-
5cb66da5daaab721a733d039c3671582_JaffaCakes118.exe windows:1 windows x86 arch:x86
0fab6c09bed875feade64ea3ca38dd90
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
wsock32
closesocket
listen
htons
connect
WSAStartup
inet_ntoa
recv
inet_addr
gethostname
gethostbyname
bind
accept
WSAGetLastError
WSACleanup
socket
send
kernel32
WritePrivateProfileStringA
WriteFile
GetCurrentProcessId
Sleep
OpenFile
GetCommandLineA
CopyFileA
GetWindowsDirectoryA
GetProcAddress
ExitProcess
CloseHandle
CreateFileA
lstrlen
lstrcmp
lstrcat
GetLastError
GetModuleHandleA
lstrcpy
user32
MessageBoxA
MessageBeep
ExitWindowsEx
shell32
ShellExecuteA
advapi32
GetUserNameA
Sections
CODE Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ