Static task
static1
Behavioral task
behavioral1
Sample
5f5b6b154bab2af89529ed238c3a6cb1_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5f5b6b154bab2af89529ed238c3a6cb1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5f5b6b154bab2af89529ed238c3a6cb1_JaffaCakes118
-
Size
816KB
-
MD5
5f5b6b154bab2af89529ed238c3a6cb1
-
SHA1
4a7bc9edaa78eb0361f42cf12af747eebdda35eb
-
SHA256
c11dccbc2a399fcb34796acb17c994eb54eee792e7d8b0c985447a67d7524562
-
SHA512
665576b8721625bb59623e70f93e773dc86969458d9c24e1b05534aa500f4b875cddd943c1e88fd0e1fa393315cc6b01aa2ea1bf8cb66c37790affe7d1db036e
-
SSDEEP
6144:ppXhJVw6nLKYfnw62tvegWAc0hl4JEHjEYS3TCg6IHyJQFHeyTQ46QQiTExDqcOv:TXh86nnfnw6umgWARl4JEHjQ2UEJqcg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5f5b6b154bab2af89529ed238c3a6cb1_JaffaCakes118
Files
-
5f5b6b154bab2af89529ed238c3a6cb1_JaffaCakes118.exe windows:4 windows x86 arch:x86
eb0f234d44b6a69119ac8f56d3b77220
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
inet_addr
WSAStartup
connect
WSACleanup
ioctlsocket
socket
setsockopt
listen
htons
bind
__WSAFDIsSet
send
select
closesocket
accept
recv
kernel32
GetComputerNameA
GetCurrentProcess
SetEnvironmentVariableA
CompareStringW
GetLocaleInfoW
SetEndOfFile
CompareStringA
EnumSystemLocalesA
IsValidCodePage
GetUserDefaultLCID
FlushFileBuffers
SetStdHandle
IsValidLocale
GetStringTypeA
GetFileType
GetStringTypeW
GetModuleFileNameA
Sleep
MultiByteToWideChar
ReadFile
CloseHandle
WriteFile
TransactNamedPipe
CreateFileA
SetFilePointer
GetFileSize
GetTickCount
GetLastError
CopyFileA
WideCharToMultiByte
CreateThread
ExitThread
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetLocalTime
GetSystemDirectoryA
QueryPerformanceCounter
QueryPerformanceFrequency
ExitProcess
CreateProcessA
FindClose
FindNextFileA
FindFirstFileA
FreeLibrary
GetEnvironmentVariableW
GetProcAddress
LoadLibraryA
HeapFree
HeapAlloc
GetProcessHeap
FileTimeToSystemTime
FileTimeToLocalFileTime
VirtualQueryEx
ReadProcessMemory
GetSystemInfo
OpenProcess
GetTimeFormatA
GetDateFormatA
GetFileAttributesA
GetModuleHandleA
FormatMessageA
GlobalUnlock
GlobalLock
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SetFileTime
GetFileTime
ExpandEnvironmentStringsA
SetFileAttributesA
GetTempPathA
DebugBreak
GetVersion
TerminateProcess
DeleteFileA
GetCurrentProcessId
WaitForSingleObject
CreateMutexA
TerminateThread
MoveFileA
GetExitCodeProcess
PeekNamedPipe
DuplicateHandle
CreatePipe
SetConsoleCtrlHandler
GetLocaleInfoA
GetVersionExA
GetLogicalDrives
WaitForMultipleObjects
GenerateConsoleCtrlEvent
GlobalMemoryStatus
IsBadWritePtr
IsBadReadPtr
HeapValidate
InterlockedDecrement
InterlockedIncrement
GetTimeZoneInformation
GetSystemTime
GetStartupInfoA
GetCommandLineA
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
OutputDebugStringA
GetCPInfo
GetACP
GetOEMCP
InitializeCriticalSection
FatalAppExitA
RtlUnwind
HeapReAlloc
VirtualFree
VirtualAlloc
GetEnvironmentVariableA
HeapDestroy
HeapCreate
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetCurrentThread
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
Sections
SDPC Size: 812KB - Virtual size: 812KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE