Static task
static1
Behavioral task
behavioral1
Sample
8c713117af4ca6bbd69292a78069e75b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8c713117af4ca6bbd69292a78069e75b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8c713117af4ca6bbd69292a78069e75b_JaffaCakes118
-
Size
44KB
-
MD5
8c713117af4ca6bbd69292a78069e75b
-
SHA1
eb518cda3c4f4e6938aaaee07f1f7db8ee91c901
-
SHA256
c50a48ef605b1f57f37afb883d643d69233cf506065d2bf806dae639cac8c264
-
SHA512
a4127563a7c4c5f689242be31ed7e7489d7e7d7aaf99f330c9b118258ccd81e185b9d67c0bed814d7b7e261282db55661df4576f2222eb5bb2cf2cfe198b2ec1
-
SSDEEP
768:EKKfoiZ/wFLDrQO6VdaLuCDmARlDNfAdjV1lNApPLEkPgj1APBpFXv5zcnVP+h:S/GrgVdaF6qlBfAdZWFPbJnZh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c713117af4ca6bbd69292a78069e75b_JaffaCakes118
Files
-
8c713117af4ca6bbd69292a78069e75b_JaffaCakes118.exe windows:4 windows x86 arch:x86
851f1a39ad4314eee69c52c016028816
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
SetSecurityInfo
SetEntriesInAclA
AdjustTokenPrivileges
LookupPrivilegeValueA
GetTokenInformation
OpenProcessToken
LookupAccountSidA
RegEnumKeyExA
RegOpenKeyExA
RegEnumValueA
RegDeleteValueA
wsock32
WSAGetLastError
WSAStartup
WSACleanup
socket
htons
ioctlsocket
inet_ntoa
connect
select
recv
gethostname
gethostbyname
inet_addr
closesocket
send
mpr
WNetCloseEnum
shlwapi
SHGetValueA
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
netapi32
NetApiBufferFree
NetGetDCName
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoCreateInstance
msvcrt
atoi
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
isdigit
swprintf
fwrite
fopen
fseek
exit
fclose
rename
strrchr
_strnicmp
sprintf
memset
strstr
strchr
memcpy
strcmp
strncpy
free
time
srand
rand
strcpy
strcat
malloc
strlen
_EH_prolog
__CxxFrameHandler
fread
isalpha
_access
memcmp
_itoa
kernel32
GetPriorityClass
GetStartupInfoA
PeekNamedPipe
ReadFile
GetModuleHandleA
WriteFile
GetModuleFileNameA
SetCurrentDirectoryA
CreateProcessA
MultiByteToWideChar
GlobalAlloc
GlobalFree
GetWindowsDirectoryA
OpenProcess
GetFileSize
CopyFileA
RemoveDirectoryA
FindNextFileA
FindFirstFileA
FindClose
CreateFileA
CreateDirectoryA
GetFileAttributesA
SetFileAttributesA
GetCurrentProcess
DuplicateHandle
GetLastError
LocalFree
GetLogicalDriveStringsA
GetDriveTypeA
GetVolumeInformationA
DeleteFileA
GetVersionExA
GetSystemDefaultLangID
LoadLibraryA
TerminateProcess
GetProcAddress
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
FreeLibrary
GetComputerNameA
OpenMutexA
CloseHandle
SetEvent
WaitForSingleObject
CreateMutexA
CreateEventA
Sleep
CreateThread
GetTickCount
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ