Static task
static1
Behavioral task
behavioral1
Sample
71f2a55b9703d186fc7612c9d8d450a5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
71f2a55b9703d186fc7612c9d8d450a5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
71f2a55b9703d186fc7612c9d8d450a5_JaffaCakes118
-
Size
44KB
-
MD5
71f2a55b9703d186fc7612c9d8d450a5
-
SHA1
a11678e047cbb8a018d539fe76e634e1cc9553f3
-
SHA256
77477f97e3f9a392eaa62df6e3a99261bc6e420d17157b0861df011f8ddc50ea
-
SHA512
c9c3d0e2f39ebfec883862b839c20fd9a8b22bf842a9f3434049467182ac8bc934b4368ff72d887b2a57b34ec7ef7f40ac70b3c7e7449daf3a16b411b6cd48cf
-
SSDEEP
768:dAmEnK9dfUIkuHJPWi+Z4drVe3gXJg5nyJjSP:qK9dEusZAU3iIWjSP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 71f2a55b9703d186fc7612c9d8d450a5_JaffaCakes118
Files
-
71f2a55b9703d186fc7612c9d8d450a5_JaffaCakes118.exe windows:4 windows x86 arch:x86
7ec498fdc560ff8459b9755e024fd3fd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
GetTickCount
HeapAlloc
GetProcessHeap
TerminateThread
TerminateProcess
OpenProcess
CreateProcessA
CreateThread
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcess
ResumeThread
ExitThread
GetCurrentThread
SetPriorityClass
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
GetModuleHandleA
lstrlenA
GetLastError
SetFileAttributesA
CopyFileA
GetStartupInfoA
LoadLibraryA
GetProcAddress
Sleep
GetVersionExA
GlobalMemoryStatus
FindResourceA
SizeofResource
LoadResource
GlobalAlloc
LockResource
GlobalFree
CreateFileA
GetFileTime
WriteFile
SetFileTime
CloseHandle
SetThreadPriority
GetSystemDirectoryA
user32
ExitWindowsEx
wsprintfA
advapi32
CreateServiceA
RegOpenKeyA
RegSetValueExA
CloseServiceHandle
RegCloseKey
RegOpenKeyExA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
OpenSCManagerA
OpenServiceA
DeleteService
ControlService
StartServiceA
mfc42
ord2818
ord6648
ord800
ord535
ord6877
ord939
ord4129
ord4278
ord860
ord6663
ord858
ord540
ord2915
ord2764
ord2846
ord537
ord922
ord924
ord926
ord5710
msvcrt
atoi
srand
time
printf
_mbscmp
exit
strtok
strchr
strncmp
strstr
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
__CxxFrameHandler
_except_handler3
rand
urlmon
URLDownloadToFileA
msvcp60
??1_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
ws2_32
gethostbyname
closesocket
connect
htons
inet_addr
socket
send
WSAGetLastError
recv
__WSAFDIsSet
select
WSAStartup
sendto
setsockopt
WSASocketA
gethostname
htonl
inet_ntoa
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ