Static task
static1
Behavioral task
behavioral1
Sample
ae4adc41bd60f9b130c9a0fa019a0439_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ae4adc41bd60f9b130c9a0fa019a0439_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ae4adc41bd60f9b130c9a0fa019a0439_JaffaCakes118
-
Size
80KB
-
MD5
ae4adc41bd60f9b130c9a0fa019a0439
-
SHA1
f4a8b9069db7f3163bc165de2d3c9f3d91544f53
-
SHA256
a50394b25587b9b8c43b6fbd0b686502967bfaa1c0465f6242c524e458bba700
-
SHA512
d6f77987e737834be6f0adce9f29249b2b095dc9287f8f781b339667963698dbfc820cd28b7e8d848e6458d4122951570216b8a3f99796645c259a1a89ab7c1e
-
SSDEEP
1536:NehFBWm9yvNwj+qhB4SP5wu8cVEh78WotpHnY:NeFyvmqqhCg8c2h7wLHY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae4adc41bd60f9b130c9a0fa019a0439_JaffaCakes118
Files
-
ae4adc41bd60f9b130c9a0fa019a0439_JaffaCakes118.exe windows:4 windows x86 arch:x86
8db96c0892400c13a4bf10c16c06f014
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
ExitThread
GetCurrentProcessId
SetThreadPriority
HeapAlloc
GetProcessHeap
CloseHandle
TerminateThread
GetTempPathA
CreateThread
GetModuleHandleA
GetStartupInfoA
CreateProcessA
ResumeThread
GetModuleFileNameA
CopyFileA
SetFileAttributesA
GetLastError
lstrlenA
LoadLibraryA
GetProcAddress
Sleep
GetVersionExA
GlobalMemoryStatus
GetTickCount
GetSystemDirectoryA
user32
wsprintfA
comdlg32
GetFileTitleA
advapi32
RegisterServiceCtrlHandlerA
OpenSCManagerA
CreateServiceA
OpenServiceA
StartServiceA
RegOpenKeyA
RegSetValueExA
CloseServiceHandle
RegCloseKey
RegOpenKeyExA
StartServiceCtrlDispatcherA
DeleteService
SetServiceStatus
mfc42
ord537
ord6648
ord6877
ord939
ord2818
ord800
ord4278
ord860
ord6663
ord858
ord535
ord540
ord2915
ord2764
ord2846
ord4129
ord922
ord924
ord926
ord5710
msvcrt
atoi
srand
time
__CxxFrameHandler
strstr
strncmp
printf
_mbscmp
strtok
strchr
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
exit
_except_handler3
rand
urlmon
URLDownloadToFileA
msvcp60
??1_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
ws2_32
recv
inet_ntoa
gethostbyname
closesocket
connect
htons
inet_addr
socket
send
WSAGetLastError
htonl
__WSAFDIsSet
setsockopt
WSAStartup
sendto
WSASocketA
gethostname
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.code0 Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ