Static task
static1
Behavioral task
behavioral1
Sample
b2ca7cb22ad5c95423106c731e12e480_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b2ca7cb22ad5c95423106c731e12e480_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b2ca7cb22ad5c95423106c731e12e480_JaffaCakes118
-
Size
216KB
-
MD5
b2ca7cb22ad5c95423106c731e12e480
-
SHA1
1aaaf4f53ede7d8bdaa86e4200d9865c11657568
-
SHA256
afa8817d6673254106c4513c1744f773a0b8ec064c36062173391adb8fe9510b
-
SHA512
7977a647e2b3bf41f31692ace86e6c61dc492b08f6288e1083638771693cd16aba78cd6bc830eb70d81266835696bdd0f1a16edfccb374d0b411c08c597d67a8
-
SSDEEP
6144:/AjYv0fF2pwtLfkxhPLHQOWOon+Yy3T6H6t1:GYO2pwtLfkbPLHQQ+y33
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b2ca7cb22ad5c95423106c731e12e480_JaffaCakes118
Files
-
b2ca7cb22ad5c95423106c731e12e480_JaffaCakes118.exe windows:4 windows x86 arch:x86
a92fdf482c7f19903377a37cd7dbcd8e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_iob
__CxxFrameHandler
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
_endthreadex
_beginthreadex
_except_handler3
sprintf
isdigit
calloc
fprintf
printf
perror
_errno
strerror
fflush
sscanf
strcat
toupper
fputc
wcscat
_ftol
__set_app_type
srand
fwrite
fseek
ftell
malloc
free
exit
strncmp
atof
memcmp
strchr
strncat
_memccpy
_stricmp
system
atoi
strcpy
fopen
fread
strcmp
fclose
memmove
memcpy
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
_CxxThrowException
??0exception@@QAE@ABV0@@Z
_vsnprintf
strlen
strncpy
memset
strstr
??2@YAPAXI@Z
??3@YAXPAX@Z
_purecall
_controlfp
rand
_strdup
msvcp60
?_Xran@std@@YAXXZ
?_Xlen@std@@YAXXZ
kernel32
TransactNamedPipe
GetStartupInfoA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
TlsGetValue
SetLastError
TlsFree
TlsAlloc
GetExitCodeThread
ReleaseSemaphore
CreateSemaphoreA
GetCurrentProcessId
SetThreadPriority
RaiseException
TlsSetValue
DeleteCriticalSection
InitializeCriticalSection
WaitForMultipleObjects
CreateEventA
GetCurrentThreadId
GetCurrentProcess
GetCurrentThread
DuplicateHandle
InterlockedIncrement
GetThreadPriority
EnterCriticalSection
LeaveCriticalSection
ResumeThread
WaitForSingleObject
ResetEvent
InterlockedDecrement
CreateThread
MultiByteToWideChar
GetLastError
GetSystemDirectoryA
CopyFileA
GetModuleFileNameA
OpenProcess
GetModuleHandleA
FreeConsole
AllocConsole
GetStdHandle
WriteFile
CreateNamedPipeA
GetTickCount
Sleep
FreeLibrary
GetProcAddress
LoadLibraryA
DeleteFileA
CreateProcessA
ExpandEnvironmentStringsA
GetComputerNameA
GetVersionExA
GlobalMemoryStatus
ReadFile
CloseHandle
TerminateProcess
CreateFileA
WaitNamedPipeA
user32
ExitWindowsEx
wsprintfA
advapi32
CreateServiceA
RegQueryValueExA
RegQueryInfoKeyA
RegEnumKeyExA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceA
OpenServiceA
ControlService
DeleteService
OpenSCManagerA
RegSetValueExA
CloseServiceHandle
ChangeServiceConfig2A
RegDeleteValueA
RegCreateKeyExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetUserNameA
RegOpenKeyExA
RegCloseKey
shell32
ShellExecuteA
ws2_32
WSAGetLastError
recv
send
getsockname
getpeername
ioctlsocket
gethostbyname
inet_ntoa
gethostbyaddr
ntohs
select
gethostname
sendto
htonl
setsockopt
WSASocketA
WSASetLastError
getsockopt
getservbyname
shutdown
inet_addr
__WSAFDIsSet
accept
bind
listen
closesocket
socket
htons
connect
WSACleanup
WSAIoctl
WSAStartup
mpr
WNetCancelConnection2W
WNetAddConnection2W
psapi
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
Sections
.text Size: 140KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.asdfe Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE