Behavioral task
behavioral1
Sample
c296903a4a74302926012234a545c610_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
c296903a4a74302926012234a545c610_JaffaCakes118
-
Size
79KB
-
MD5
c296903a4a74302926012234a545c610
-
SHA1
7285f1f96c30cac95d046525d37618f59c7d97b4
-
SHA256
fb76dd4215e95b90a146110842c4e07ffd19d2fdd7e12d8a9b37308d1693ce50
-
SHA512
eacaec4ef64f5d48cdb63fc766f0f1d5fe5079bcf101b34c27bddd850192c4256088bce28802db382f98cef9b6ed64e5eb384995d7e2f1442901ce230bc61dd4
-
SSDEEP
1536:BdJoalrOjka45hFYDp2q2W0tVoYBsYl2EQfzqVHa:jJoalrGIjW7iVoYBsU2EY6a
Malware Config
Signatures
Files
-
c296903a4a74302926012234a545c610_JaffaCakes118.exe .pdf windows:4 windows x86 arch:x86 polyglot
0ec05e53cd054574df0c4c06f86e2e6c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegCreateKeyExA
RegSetValueExA
kernel32
AddAtomA
CloseHandle
CreateDirectoryA
CreateFileA
CreateThread
DeleteFileA
ExitProcess
ExitThread
FindAtomA
FindClose
FindFirstFileA
FindFirstFileExA
FindNextFileA
FindResourceA
GetAtomNameA
GetDriveTypeA
GetLogicalDriveStringsA
GetModuleFileNameA
GetSystemTime
LoadResource
LockResource
OpenProcess
ReadDirectoryChangesW
SetCurrentDirectoryA
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
WideCharToMultiByte
WinExec
WriteFile
lstrcmpA
lstrlenA
msvcrt
_access
_close
_open
_read
_write
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
exit
fflush
fprintf
free
malloc
memcpy
memset
qsort
signal
sprintf
strcat
strcmp
strcpy
strlen
tolower
shell32
SHGetFolderPathA
ShellExecuteA
user32
FindWindowA
GetWindowThreadProcessId
wininet
FtpPutFileA
InternetCloseHandle
InternetConnectA
InternetOpenA
ws2_32
WSACleanup
WSAIoctl
WSAStartup
bind
closesocket
gethostbyname
gethostname
recvfrom
socket
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 784B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE