Static task
static1
Behavioral task
behavioral1
Sample
cf3245c2bfb9ba41151a120a79145c44_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cf3245c2bfb9ba41151a120a79145c44_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cf3245c2bfb9ba41151a120a79145c44_JaffaCakes118
-
Size
44KB
-
MD5
cf3245c2bfb9ba41151a120a79145c44
-
SHA1
6c4ed13ea9b3a5ce335f0a20eb6caef12e58580b
-
SHA256
3e4925638365adbfe992186238b8d76da990b54dc9a2a5f8132469edbc96a61f
-
SHA512
593836a2e96e9d35a153093229c05eda671e27150529411e4e89e04f8c1b3d6e89376ba43ec2473a19cdf1496d9e95dd81e6ff0eeace79d5551d0549c7a7da5f
-
SSDEEP
768:9Iuwsb6OVy/aaHf74IfbmVMByvURjBgb5Up64edjjn1/jSj:QOVyPbauyvURjBk5U6FtjSj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cf3245c2bfb9ba41151a120a79145c44_JaffaCakes118
Files
-
cf3245c2bfb9ba41151a120a79145c44_JaffaCakes118.exe windows:4 windows x86 arch:x86
8f8df9671024226cfaaeb51c317c29f1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
GetTickCount
HeapAlloc
GetProcessHeap
TerminateThread
TerminateProcess
OpenProcess
CreateProcessA
CreateThread
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcess
GetModuleHandleA
ExitThread
SetThreadPriority
GetCurrentThread
SetPriorityClass
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
lstrlenA
GetLastError
SetFileAttributesA
CopyFileA
GetStartupInfoA
LoadLibraryA
GetProcAddress
Sleep
GetVersionExA
GlobalMemoryStatus
FindResourceA
SizeofResource
LoadResource
GlobalAlloc
LockResource
GlobalFree
CreateFileA
GetFileTime
WriteFile
SetFileTime
CloseHandle
ResumeThread
GetSystemDirectoryA
user32
ExitWindowsEx
wsprintfA
advapi32
CreateServiceA
RegOpenKeyA
RegSetValueExA
CloseServiceHandle
RegCloseKey
RegOpenKeyExA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
OpenSCManagerA
OpenServiceA
DeleteService
StartServiceA
mfc42
ord2818
ord6648
ord800
ord535
ord6877
ord939
ord4129
ord4278
ord860
ord6663
ord858
ord540
ord2915
ord2764
ord2846
ord537
ord922
ord924
ord926
ord5710
msvcrt
atoi
srand
time
printf
_mbscmp
exit
strtok
strchr
strncmp
strstr
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
__CxxFrameHandler
_except_handler3
rand
urlmon
URLDownloadToFileA
msvcp60
??1_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
ws2_32
gethostbyname
closesocket
connect
htons
inet_addr
socket
send
WSAGetLastError
recv
__WSAFDIsSet
select
WSAStartup
sendto
setsockopt
WSASocketA
gethostname
htonl
inet_ntoa
Sections
.text Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ