Static task
static1
Behavioral task
behavioral1
Sample
bf79b544b32d7fc4a79871345ed13405_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bf79b544b32d7fc4a79871345ed13405_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bf79b544b32d7fc4a79871345ed13405_JaffaCakes118
-
Size
64KB
-
MD5
bf79b544b32d7fc4a79871345ed13405
-
SHA1
b44bd73ff6b99bb1404fab74078877350d7a15ab
-
SHA256
b65350ed2b94c09db9d63fa729e91f2cd01924663a91c8fc1858695d3b094c9c
-
SHA512
38507e199e6d2eedaf3ef358c28578e750213b4a0fbbf52ab87bf9b40694dca1998b60c0f4337cbad6da237cab7aeac2175e00711771bf3887b8610af6cc052c
-
SSDEEP
1536:NVfOsDnKPAVhMdUapeGcvbmg+0BGwHxQtc9J:fWOup0GUbnwwH6c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bf79b544b32d7fc4a79871345ed13405_JaffaCakes118
Files
-
bf79b544b32d7fc4a79871345ed13405_JaffaCakes118.exe windows:4 windows x86 arch:x86
86e54beaad41a41296d3444cdad62734
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpynA
lstrlenA
lstrcpyA
lstrcatA
Sleep
GetLastError
HeapFree
GetProcessHeap
HeapAlloc
GetProcAddress
LoadLibraryA
GetModuleHandleA
lstrcmpA
lstrcmpiA
user32
wsprintfA
ws2_32
ntohs
sendto
send
htons
connect
WSAGetLastError
select
socket
ioctlsocket
setsockopt
shutdown
closesocket
recv
WSACleanup
WSAStartup
inet_addr
gethostname
gethostbyname
inet_ntoa
__WSAFDIsSet
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
atol
_strlwr
_itoa
_stricmp
strchr
_strupr
strncmp
fopen
strstr
memset
atoi
memcpy
free
malloc
fclose
fwrite
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 279KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE