KeyEvent@12
Static task
static1
Behavioral task
behavioral1
Sample
c7c67a3973393828c6dbed2d0a197c07_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c7c67a3973393828c6dbed2d0a197c07_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c7c67a3973393828c6dbed2d0a197c07_JaffaCakes118
-
Size
159KB
-
MD5
c7c67a3973393828c6dbed2d0a197c07
-
SHA1
47a38204c39acaf15985911465b25b39f95965e1
-
SHA256
8988c7abac7e3fba25feb288ddc68721fd8e297f63a4cf1d887f113e0014bdff
-
SHA512
9a8879e51336a008e997df3785c21300cd4d0c0433f85acdca5a31848567c97d2756612ab6fbeacc29b285c25b7c920d80ad0515c48a1e5a44d8404c656f55ae
-
SSDEEP
1536:EVbBt8cg/ekOqSAKXqUCBWHHB6GL0N0gIFGEwFL8JUTND66dftA:UbBt0/esSAKmMnMGL0NLTE9yhDdftA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c7c67a3973393828c6dbed2d0a197c07_JaffaCakes118
Files
-
c7c67a3973393828c6dbed2d0a197c07_JaffaCakes118.exe windows:4 windows x86 arch:x86
9aadc879f42315ad3c34b42d9332f83b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
psapi
GetModuleBaseNameA
ws2_32
WSACleanup
WSAStartup
accept
bind
closesocket
connect
gethostbyname
gethostname
htonl
htons
inet_addr
inet_ntoa
listen
recv
send
sendto
shutdown
socket
advapi32
AdjustTokenPrivileges
CloseServiceHandle
CreateServiceA
LookupPrivilegeValueA
OpenProcessToken
OpenSCManagerA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
RegSetValueExA
SetEntriesInAclA
SetSecurityInfo
kernel32
AddAtomA
CloseHandle
CreateThread
CreateToolhelp32Snapshot
ExitProcess
FindAtomA
GetAtomNameA
GetComputerNameA
GetCurrentProcessId
GetLastError
GetLocalTime
GetModuleHandleA
GetTickCount
LocalFree
OpenProcess
Process32First
Process32Next
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
WaitForSingleObject
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_beginthread
_cexit
_iob
_onexit
_setmode
abort
atexit
exit
fclose
fgets
fopen
fprintf
fputs
fread
free
fwrite
getc
malloc
memcpy
memset
perror
printf
putc
rand
signal
sprintf
srand
sscanf
strcat
strcpy
strlen
strstr
strtol
system
time
shell32
ShellExecuteA
user32
CallNextHookEx
DispatchMessageA
GetForegroundWindow
GetKeyboardState
GetMessageA
GetWindowTextA
GetWindowThreadProcessId
MessageBoxA
SetWindowsHookExA
ToAscii
TranslateMessage
UnhookWindowsHookEx
Exports
Exports
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 340B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 460B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 73B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 98KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ