Static task
static1
Behavioral task
behavioral1
Sample
8bce3d6a7fb1d628ca80546cd08be49c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8bce3d6a7fb1d628ca80546cd08be49c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8bce3d6a7fb1d628ca80546cd08be49c_JaffaCakes118
-
Size
30KB
-
MD5
8bce3d6a7fb1d628ca80546cd08be49c
-
SHA1
1c2c3682bdb7b5c4916d40be9cf81a13f617d42a
-
SHA256
2f6f5c96de6c79bbb09e076c6c9cd0b81b2fa4c64f176fe7149bbfba5818b7b5
-
SHA512
e6a20162ab97879394eb32e03e763bf8723cbf93989b61253cf6bd34a6d9d4bf1af8d8fa07047ee944ae44910e5f1cefc15ffd344ce4a1d970dd54b53009c08f
-
SSDEEP
768:2pflvQCSvGrNmqAbevm4k7DF6GOz9lPmt:2hkvGrNmqAbGkV6GOz95Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8bce3d6a7fb1d628ca80546cd08be49c_JaffaCakes118
Files
-
8bce3d6a7fb1d628ca80546cd08be49c_JaffaCakes118.exe windows:4 windows x86 arch:x86
3df4b67308e50f896e6b026773167940
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
closesocket
recv
select
socket
htons
send
ioctlsocket
gethostbyname
inet_addr
sendto
getsockname
connect
WSAStartup
WSACleanup
urlmon
URLDownloadToFileA
kernel32
GetWindowsDirectoryA
LocalFree
GetStartupInfoA
GetLogicalDriveStringsA
GetDriveTypeA
lstrcatA
CreateDirectoryA
CreateFileA
Process32Next
TerminateProcess
Process32First
CreateToolhelp32Snapshot
CloseHandle
ReadProcessMemory
OpenProcess
Module32Next
DeleteFileA
Sleep
SetFileAttributesA
Module32First
GetModuleFileNameA
GetModuleHandleA
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
VirtualAlloc
CreateProcessA
ExpandEnvironmentStringsA
WriteFile
CopyFileA
GetFileAttributesA
lstrcmpiA
GetLastError
CreateThread
ExitProcess
GetLocaleInfoA
GetTempPathA
GetTickCount
ExitThread
GetSystemDefaultLangID
GlobalUnlock
GlobalLock
GlobalAlloc
CreateMutexA
SetErrorMode
GetCurrentProcess
GetProcAddress
GetVersionExA
TerminateThread
WaitForSingleObject
lstrlenA
shell32
ShellExecuteA
advapi32
RegQueryValueExA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
user32
EmptyClipboard
VkKeyScanA
ShowWindow
FindWindowA
wsprintfA
SetClipboardData
OpenClipboard
keybd_event
SetFocus
SetForegroundWindow
BlockInput
IsWindow
SendMessageA
MessageBoxA
CloseClipboard
msvcrt
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__getmainargs
_acmdln
_except_handler3
_controlfp
_CxxThrowException
??3@YAXPAX@Z
??1type_info@@UAE@XZ
exit
_XcptFilter
_exit
fclose
malloc
_ftol
strncat
toupper
srand
strtok
atoi
strchr
strncmp
memmove
strncpy
strlen
fprintf
fopen
sprintf
strstr
memset
strcat
strcmp
getchar
memcpy
rand
strcpy
_snprintf
ole32
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
VariantInit
SysAllocString
VariantClear
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE