Static task
static1
Behavioral task
behavioral1
Sample
b95ab5603ec61b5b3261cf5568a3aa3c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b95ab5603ec61b5b3261cf5568a3aa3c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b95ab5603ec61b5b3261cf5568a3aa3c_JaffaCakes118
-
Size
244KB
-
MD5
b95ab5603ec61b5b3261cf5568a3aa3c
-
SHA1
20d4fc212274743bbda34e5a5983d178787c9b63
-
SHA256
2c0fb2b28abbd77788359eee1a49c5007a944c919e6d89a9668428897f69be0f
-
SHA512
c0ca98e076f0ff31a5f8a1d8fb571b9b4647ed313b8bfe04718642d3a85d79e361b5de2cab05e637a9b50d938e7610b3c902e8249575eda78067eaa0aee6cfe2
-
SSDEEP
1536:4x/EtI6ooA6o2ZiryOwNS2ya6aneYrz4I6u9vhoK4Xbp1U+dGbTeb:eEtI6ooA6o2Zizwbzzh6uJhoK4M8Gf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b95ab5603ec61b5b3261cf5568a3aa3c_JaffaCakes118
Files
-
b95ab5603ec61b5b3261cf5568a3aa3c_JaffaCakes118.exe windows:4 windows x86 arch:x86
d8c99254fc1f20c36799d1e182282b90
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSACleanup
WSAStartup
setsockopt
bind
listen
select
__WSAFDIsSet
accept
gethostbyname
shutdown
inet_addr
htons
recv
send
socket
ioctlsocket
connect
closesocket
kernel32
MapViewOfFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
ExitThread
GetTickCount
QueryPerformanceCounter
QueryPerformanceFrequency
Sleep
GetSystemDirectoryA
GetLocalTime
MultiByteToWideChar
ReadFile
CloseHandle
WriteFile
TransactNamedPipe
CreateFileA
GetModuleFileNameA
GetTimeFormatA
GetDateFormatA
GetLastError
CreateThread
GetFileSize
GetFileAttributesA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindNextFileA
FindFirstFileA
SetFilePointer
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
FreeLibrary
GetEnvironmentVariableW
GetProcAddress
LoadLibraryA
HeapFree
HeapAlloc
GetProcessHeap
VirtualQueryEx
ReadProcessMemory
GetSystemInfo
OpenProcess
GetModuleHandleA
FormatMessageA
GlobalUnlock
GlobalLock
UnmapViewOfFile
CreateFileMappingA
SetFileTime
GetFileTime
CreateProcessA
ExpandEnvironmentStringsA
SetFileAttributesA
GetTempPathA
GetExitCodeProcess
PeekNamedPipe
DuplicateHandle
GetCurrentProcess
CreatePipe
GetVersionExA
GlobalMemoryStatus
ExitProcess
WideCharToMultiByte
GetComputerNameA
DeleteFileA
GetCurrentProcessId
CopyFileA
WaitForSingleObject
CreateMutexA
TerminateThread
MoveFileA
TerminateProcess
lstrcmpiA
GetLocaleInfoA
GetLogicalDrives
GetTimeZoneInformation
GetSystemTime
HeapReAlloc
GetStartupInfoA
GetCommandLineA
GetVersion
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
LCMapStringA
LCMapStringW
GetCPInfo
GetACP
Sections
.text Size: 126KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 111KB - Virtual size: 985KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE