Static task
static1
Behavioral task
behavioral1
Sample
a4a9a6459f4d785d0b7805b681e25a7f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a4a9a6459f4d785d0b7805b681e25a7f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a4a9a6459f4d785d0b7805b681e25a7f_JaffaCakes118
-
Size
20KB
-
MD5
a4a9a6459f4d785d0b7805b681e25a7f
-
SHA1
126b0f5cbfd893d0d361c5bcd7dd49ca594c61c3
-
SHA256
b208896d34a303a4c7887f62709c3a6d6cd00cfbe577c18a334d2bacf860ebf1
-
SHA512
ef11ed9457addc648713a895dce212b912b427785908d0a7a92e79d7db1ff8471d766bb0962c186de8faae63f4ea0b77e04272b41e75a5d0560bae0fc63d51e5
-
SSDEEP
96:q+UbYo47T+RKT7jgCeDgWTBPT9/5lzWDJXY9Cu//15VkAxn34n0EKaPtboynKeZo:WnR3XgWZT9BpsJXyRx340EPP1oynKge
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a4a9a6459f4d785d0b7805b681e25a7f_JaffaCakes118
Files
-
a4a9a6459f4d785d0b7805b681e25a7f_JaffaCakes118.exe windows:4 windows x86 arch:x86
0190ba4435b60274b7f8c005a7a48596
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpyA
Sleep
GlobalAlloc
GetProcAddress
LoadLibraryA
lstrlenA
lstrcatA
GetLastError
HeapAlloc
GetProcessHeap
CloseHandle
TerminateThread
HeapFree
WaitForMultipleObjects
CreateProcessA
GetModuleHandleA
GetStartupInfoA
user32
wsprintfA
MessageBoxA
ws2_32
WSASocketA
inet_addr
sendto
recvfrom
socket
gethostbyname
htons
connect
WSAStartup
closesocket
send
recv
setsockopt
msvcrt
strcat
exit
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_XcptFilter
_initterm
__getmainargs
memset
atoi
strlen
strcpy
strstr
malloc
_exit
memcpy
rand
_acmdln
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE