Static task
static1
Behavioral task
behavioral1
Sample
d06882d71fe28b39c60470e54fd1b928_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d06882d71fe28b39c60470e54fd1b928_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d06882d71fe28b39c60470e54fd1b928_JaffaCakes118
-
Size
71KB
-
MD5
d06882d71fe28b39c60470e54fd1b928
-
SHA1
c3dff6e60996909953e14d09ae69d9ddc6f98043
-
SHA256
48a3abdd64bea4be2d3140b4acb7805f036af865bf8bbe2a1e5affa674fe0760
-
SHA512
b30dbe22c4dcd3bf821b2d64a84687e53138cf9628bdca96616b7890db7c7220f473a0c5edeec7f6cef12e9fca998f2a507cda6ae28f01952582d4475b87f397
-
SSDEEP
768:LkdltMLWc2BMfiIjoOJIRmnwOgzuopAsBSWnmlkgBxMEiB9v13brkCsSeaojLwT6:LxUPIjoSpw/rmlXK3tVojY6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d06882d71fe28b39c60470e54fd1b928_JaffaCakes118
Files
-
d06882d71fe28b39c60470e54fd1b928_JaffaCakes118.exe windows:4 windows x86 arch:x86
c0d866d8be37bfa4395c7cb2750d948e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryA
MultiByteToWideChar
WideCharToMultiByte
CreateProcessA
CloseHandle
GetTempPathA
GetModuleHandleA
DeleteFileA
GetLocalTime
GetModuleFileNameA
TerminateThread
WriteFile
CreateFileA
GetVersionExA
GlobalMemoryStatus
ExpandEnvironmentStringsA
SetEndOfFile
GetOEMCP
GetACP
CopyFileA
LoadLibraryA
GetProcAddress
GetTickCount
CreateThread
Sleep
GetComputerNameA
FreeLibrary
GetCPInfo
GetStringTypeW
GetStringTypeA
SetFilePointer
FlushFileBuffers
SetStdHandle
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
ReadFile
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetLastError
GetVersion
GetCommandLineA
GetStartupInfoA
HeapAlloc
GetCurrentProcess
TerminateProcess
ExitProcess
HeapFree
mpr
WNetAddConnection2A
WNetCancelConnection2A
advapi32
RegOpenKeyExA
RegQueryValueExA
GetUserNameA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegDeleteValueA
shell32
ShellExecuteA
ws2_32
listen
accept
send
gethostbyname
bind
WSAStartup
WSACleanup
htonl
WSASocketA
setsockopt
sendto
inet_ntoa
socket
htons
ioctlsocket
connect
select
closesocket
WSAAsyncSelect
recv
getsockname
gethostbyaddr
inet_addr
wininet
HttpSendRequestA
InternetCloseHandle
InternetOpenA
HttpOpenRequestA
InternetConnectA
InternetReadFile
InternetOpenUrlA
InternetCrackUrlA
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE