Static task
static1
Behavioral task
behavioral1
Sample
8de4346117703705eb93a69591fe9c63_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8de4346117703705eb93a69591fe9c63_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8de4346117703705eb93a69591fe9c63_JaffaCakes118
-
Size
93KB
-
MD5
8de4346117703705eb93a69591fe9c63
-
SHA1
0bfec5e172330c4cbd218b0ab9e5e15ccc8e7d80
-
SHA256
7c243ca867057cf7092d54cb9f215bce1645ca66aee01c81c1920f8a55ec0304
-
SHA512
49382d202935fca26ce9e9f04d187b91b87ae703c568b90180f21cb29a9f403483bac6451d16ceeaabfd958729e14a5604c437c14f765fb3ba956f4b70e0de1f
-
SSDEEP
1536:u9rHhdsDgwngaXfZcUEPHR+ZFdx8Ys0dD+j+sQ6Pr1fvIKEdTzuhOChC38usHfJs:grHhdsUtgZZEPHR+Dd2Yz1g+sQ6Pr1fO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8de4346117703705eb93a69591fe9c63_JaffaCakes118
Files
-
8de4346117703705eb93a69591fe9c63_JaffaCakes118.exe windows:4 windows x86 arch:x86
bae5cceb82b57219e6a27677b7bd41af
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
CloseServiceHandle
ControlService
CreateServiceA
DeleteService
GetSidIdentifierAuthority
GetSidSubAuthority
GetSidSubAuthorityCount
GetUserNameA
IsValidSid
LookupAccountNameA
OpenSCManagerA
OpenServiceA
StartServiceA
kernel32
AddAtomA
CloseHandle
CreateDirectoryA
CreateFileA
CreateSemaphoreA
CreateToolhelp32Snapshot
DeleteFileA
DeviceIoControl
ExitProcess
FindAtomA
FindResourceA
GetAtomNameA
GetCurrentDirectoryA
GetCurrentProcessId
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetVersionExA
InterlockedDecrement
InterlockedIncrement
LoadResource
LocalAlloc
LocalFree
LockResource
OpenProcess
Process32First
Process32Next
ReadProcessMemory
ReleaseSemaphore
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WriteFile
lstrlenA
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
fflush
fprintf
free
malloc
memcmp
memcpy
memset
printf
signal
sprintf
strcat
strcmp
strcpy
strlen
user32
FindWindowA
GetWindowThreadProcessId
ws2_32
WSACleanup
WSAStartup
closesocket
connect
htons
inet_addr
recv
send
socket
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 400B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 17KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE