Static task
static1
Behavioral task
behavioral1
Sample
aa96c2b5d3f74b5b67cbd873884730fa_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aa96c2b5d3f74b5b67cbd873884730fa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aa96c2b5d3f74b5b67cbd873884730fa_JaffaCakes118
-
Size
234KB
-
MD5
aa96c2b5d3f74b5b67cbd873884730fa
-
SHA1
54b38195feb200b5a52dccbaf2b3bae25eefd2c8
-
SHA256
867eb05681c4ed3352fdd172d99ea2c5a4e3cf76488474a67bb02cc01081bbe2
-
SHA512
59a4f2abad4caec5edb15e361ae1c2c14bca5d73f7e36dce833012dad0d361d4cad8032ca9b73330c69dda98b50e3ed22638e08dcaabe156277b872720f5c1e6
-
SSDEEP
6144:ijiDzb9sC70aVFGeTv7Ulq1PdPLjcv9YmIVE:iYKgVFGerwlq1PdPLA2Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aa96c2b5d3f74b5b67cbd873884730fa_JaffaCakes118
Files
-
aa96c2b5d3f74b5b67cbd873884730fa_JaffaCakes118.exe windows:4 windows x86 arch:x86
af8a069c8b9454f93a9b8bdeb237a3d9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_iob
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
_endthreadex
_beginthreadex
__CxxFrameHandler
_except_handler3
sprintf
isdigit
calloc
fprintf
printf
perror
_errno
strerror
fflush
sscanf
wcstombs
mbstowcs
wcscpy
memcmp
fputc
wcscat
strtok
_ftol
rand
__p__commode
fwrite
fseek
ftell
malloc
free
exit
strncat
strncmp
atof
strchr
strcat
system
atoi
_memccpy
_itoa
_stricmp
strcpy
fgets
fopen
fread
strcmp
fclose
memmove
memcpy
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
_CxxThrowException
??0exception@@QAE@ABV0@@Z
_vsnprintf
strlen
strncpy
memset
strstr
??2@YAPAXI@Z
??3@YAXPAX@Z
_purecall
__p__fmode
__set_app_type
_controlfp
srand
_strdup
msvcp60
?_Xran@std@@YAXXZ
?_Xlen@std@@YAXXZ
kernel32
WaitForSingleObject
GetStartupInfoA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
TlsGetValue
SetLastError
TlsFree
TlsAlloc
GetExitCodeThread
ReleaseSemaphore
CreateSemaphoreA
GetCurrentProcessId
SetThreadPriority
RaiseException
TlsSetValue
DeleteCriticalSection
InitializeCriticalSection
WaitForMultipleObjects
CreateEventA
GetCurrentThreadId
GetCurrentProcess
GetCurrentThread
DuplicateHandle
InterlockedIncrement
GetThreadPriority
EnterCriticalSection
LeaveCriticalSection
ResumeThread
ResetEvent
InterlockedDecrement
TransactNamedPipe
MultiByteToWideChar
GetLastError
GetSystemDirectoryA
CopyFileA
GetModuleFileNameA
OpenProcess
GetModuleHandleA
FreeConsole
AllocConsole
GetStdHandle
WriteFile
CreateNamedPipeA
WaitNamedPipeA
CreateFileA
TerminateProcess
CloseHandle
ReadFile
GetTickCount
Sleep
FreeLibrary
GetProcAddress
LoadLibraryA
DeleteFileA
ExitProcess
CreateProcessA
ExpandEnvironmentStringsA
GetComputerNameA
GetVersionExA
GlobalMemoryStatus
user32
ExitWindowsEx
wsprintfA
advapi32
CreateServiceA
RegSetValueExA
RegQueryValueExA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceA
OpenServiceA
DeleteService
ControlService
OpenSCManagerA
RegOpenKeyExA
CloseServiceHandle
ChangeServiceConfig2A
RegDeleteValueA
RegCreateKeyExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetUserNameA
RegCloseKey
shell32
ShellExecuteA
ws2_32
gethostname
sendto
htonl
setsockopt
WSASocketA
ntohl
WSASetLastError
WSAIoctl
getservbyname
shutdown
ntohs
gethostbyaddr
inet_ntoa
gethostbyname
ioctlsocket
getpeername
getsockname
send
connect
WSACleanup
WSAStartup
inet_addr
recv
WSAGetLastError
select
__WSAFDIsSet
accept
bind
listen
closesocket
socket
getsockopt
htons
netapi32
NetUseDel
NetApiBufferFree
NetShareEnum
NetUserEnum
NetUseAdd
mpr
WNetAddConnection2A
WNetCancelConnection2W
WNetCancelConnection2A
WNetAddConnection2W
psapi
EnumProcessModules
EnumProcesses
GetModuleBaseNameA
dnsapi
DnsQuery_A
Sections
.text Size: 152KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.snot Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE