Static task
static1
Behavioral task
behavioral1
Sample
6412d507385c1b4f41c3cca6f863fb26_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6412d507385c1b4f41c3cca6f863fb26_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6412d507385c1b4f41c3cca6f863fb26_JaffaCakes118
-
Size
300KB
-
MD5
6412d507385c1b4f41c3cca6f863fb26
-
SHA1
faf093b743d824f5d58abb39ebb3dd4018b4d819
-
SHA256
7bf3cb439c025c822715398f0ea487e3237c988347a7c8e719699bfafa01e5c7
-
SHA512
e06eb46e56a8af9b414ec052865b2e78ef272dd6a4a2644a7c32ab18ded0739ba70122fec0e94acddf40324cdd29f75a1470d74ba6a40834f84d623243b1c4e4
-
SSDEEP
6144:MNHRGNfcyR+h0dubN9V+AE1+0yPJOaZhh7uItz52kfvY5fkzpMpCVr1:MocyRI9frZEItzPUQpMS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6412d507385c1b4f41c3cca6f863fb26_JaffaCakes118
Files
-
6412d507385c1b4f41c3cca6f863fb26_JaffaCakes118.exe windows:4 windows x86 arch:x86
b9bc4c3518cf126e46f081a6354dbfb1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__p__fmode
__set_app_type
_XcptFilter
fwrite
_exit
?terminate@@YAXXZ
_controlfp
fseek
_onexit
__dllonexit
??1type_info@@UAE@XZ
sprintf
__getmainargs
_acmdln
_iob
perror
_errno
strerror
fflush
sscanf
isdigit
malloc
__CxxFrameHandler
wcstombs
mbstowcs
wcscpy
memchr
_except_handler3
fprintf
strcat
toupper
fputc
wcscat
strtok
_ftol
rand
srand
calloc
exit
printf
ftell
strncmp
atof
strchr
strncat
memcmp
system
atoi
strcpy
fgets
fopen
fread
strcmp
fclose
memmove
memcpy
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
_CxxThrowException
??0exception@@QAE@ABV0@@Z
_vsnprintf
strlen
strncpy
memset
strstr
??2@YAPAXI@Z
free
??3@YAXPAX@Z
_strdup
_memccpy
_stricmp
_purecall
msvcp60
?_Xran@std@@YAXXZ
?_Xlen@std@@YAXXZ
kernel32
GetTempPathA
GetLastError
MultiByteToWideChar
TerminateProcess
CreateFileA
FreeLibrary
TerminateThread
GetStartupInfoA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
TransactNamedPipe
GetCurrentThread
GetCurrentProcess
CreateEventA
CopyFileA
GetModuleFileNameA
OpenProcess
GetModuleHandleA
CreateThread
GetTickCount
FreeConsole
AllocConsole
GetStdHandle
WriteFile
CreateNamedPipeA
WaitNamedPipeA
CloseHandle
ReadFile
GlobalMemoryStatus
GetVersionExA
GetComputerNameA
ExpandEnvironmentStringsA
CreateProcessA
GetSystemDirectoryA
ExitProcess
DeleteFileA
LoadLibraryA
GetProcAddress
Sleep
user32
ExitWindowsEx
wsprintfA
advapi32
RegisterServiceCtrlHandlerA
RegDeleteValueA
SetServiceStatus
RegQueryInfoKeyA
RegEnumKeyExA
DeleteService
ControlService
EnumServicesStatusA
RegQueryValueExA
OpenThreadToken
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
StartServiceCtrlDispatcherA
ChangeServiceConfig2A
RegCreateKeyExA
StartServiceA
OpenServiceA
OpenSCManagerA
CreateServiceA
CloseServiceHandle
RegSetValueExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetUserNameA
RegOpenKeyExA
RegCloseKey
shell32
ShellExecuteA
ws2_32
getpeername
recvfrom
getservbyname
shutdown
ntohl
WSASocketA
setsockopt
htonl
sendto
gethostname
WSAIoctl
ntohs
gethostbyaddr
inet_ntoa
gethostbyname
ioctlsocket
getsockopt
getsockname
send
recv
__WSAFDIsSet
accept
bind
listen
closesocket
socket
htons
connect
WSAGetLastError
select
WSACleanup
WSAStartup
inet_addr
netapi32
NetRemoteTOD
NetUserEnum
NetShareEnum
NetUseAdd
NetUseDel
NetApiBufferFree
NetScheduleJobAdd
mpr
WNetAddConnection2A
WNetCancelConnection2A
WNetCancelConnection2W
WNetAddConnection2W
psapi
EnumProcessModules
GetModuleBaseNameA
EnumProcesses
dnsapi
DnsQuery_A
odbc32
ord11
ord9
ord31
ord41
ord75
ord24
Sections
����t Size: 300KB - Virtual size: 300KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE