Static task
static1
Behavioral task
behavioral1
Sample
8323a3ffa31fd89cc4516a94acdf903c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8323a3ffa31fd89cc4516a94acdf903c_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
8323a3ffa31fd89cc4516a94acdf903c_JaffaCakes118
-
Size
32KB
-
MD5
8323a3ffa31fd89cc4516a94acdf903c
-
SHA1
e93c834b7c275b978b5b00347afd6d3e891c9776
-
SHA256
c22c2134383b607cc64b360f00ac21669bbc38a3fd04eb3c0f933536a8e7da96
-
SHA512
edbe5fdcc9c30c10bf8dfc8e3d99259d9d9a4551340b46a370e7a3f5cad2913020e1e59e9f65025496b820a62adaccc72031b174eac7be03307a52765b352b03
-
SSDEEP
768:DUKYoSlbqAiutHNGb7Gn9aqEvh0RhTICfi5jn3IpO:oKveqcGb7eaqEZ0F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8323a3ffa31fd89cc4516a94acdf903c_JaffaCakes118
Files
-
8323a3ffa31fd89cc4516a94acdf903c_JaffaCakes118.exe windows:4 windows x86 arch:x86
c8d27171f66ce82fbc049fbca37e588c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
msvcrt
_endthreadex
memcpy
_beginthreadex
strcat
strncmp
strchr
isdigit
isalpha
sscanf
_strnicmp
_strcmpi
rand
srand
exit
strcpy
_stricmp
__p___argv
__p___argc
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
memset
??3@YAXPAX@Z
_strdup
strtok
strstr
atoi
??2@YAPAXI@Z
strncpy
free
strlen
_ftol
kernel32
GetStartupInfoA
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetTickCount
Sleep
FreeLibrary
CreateMutexA
lstrcpynA
CloseHandle
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE