Static task
static1
Behavioral task
behavioral1
Sample
a682fc5669e7107fc82d5cc3ffe3ff09_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a682fc5669e7107fc82d5cc3ffe3ff09_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a682fc5669e7107fc82d5cc3ffe3ff09_JaffaCakes118
-
Size
32KB
-
MD5
a682fc5669e7107fc82d5cc3ffe3ff09
-
SHA1
96b1054720f3f27615d5383a1ac131ba0dc6c92b
-
SHA256
1adeff12d3641d499bba8a10455956d6f7202af9fab5f80e55ac3e5ad65a153b
-
SHA512
b59fe8033bd1f91846aa49030e416f3bd9adfd4b984455c92181aed70104004fb213040efcb36d6c02b6605ae65dc10f12552ace522949f82068040a579ef1df
-
SSDEEP
384:cmVVi5DCdmpxSAHgUt1vNixaXERU/MDULJ2WFnrn6kyA9f/3ZQh:1VViCYVQ2MoLJ2WBr6tA9W
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a682fc5669e7107fc82d5cc3ffe3ff09_JaffaCakes118
Files
-
a682fc5669e7107fc82d5cc3ffe3ff09_JaffaCakes118.exe windows:4 windows x86 arch:x86
fae13a4d81bfc3e0744c05b5ede6f048
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalMemoryStatus
lstrcpyA
GetVersionExA
GetComputerNameA
GetProcAddress
LoadLibraryA
ResumeThread
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
OpenProcess
lstrcatA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
lstrlenA
GetLastError
SetFileAttributesA
CopyFileA
GetSystemDirectoryA
GetModuleHandleA
GetStartupInfoA
TerminateProcess
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
GetProcessHeap
HeapAlloc
GetTickCount
GetCurrentProcessId
CreateThread
ExitThread
Sleep
TerminateThread
GetCurrentProcess
CloseHandle
user32
wsprintfA
advapi32
StartServiceA
RegOpenKeyA
RegSetValueExA
CloseServiceHandle
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
DeleteService
CreateServiceA
mfc42
ord540
ord800
ord6877
ord939
ord2818
ord4278
ord860
ord6663
ord858
ord535
ord922
ord924
ord926
ord537
ord4129
ord2764
ord6648
msvcrt
exit
malloc
strstr
strncmp
_except_handler3
__dllonexit
_onexit
_exit
_XcptFilter
__CxxFrameHandler
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
time
srand
rand
atoi
_acmdln
msvcp60
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
ws2_32
connect
htons
inet_addr
socket
sendto
inet_ntoa
closesocket
WSASocketA
WSAStartup
htonl
send
WSAGetLastError
recv
gethostbyname
setsockopt
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ