Static task
static1
Behavioral task
behavioral1
Sample
d2deba8069e59eb95e01e4a75b990d1e_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d2deba8069e59eb95e01e4a75b990d1e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d2deba8069e59eb95e01e4a75b990d1e_JaffaCakes118
-
Size
23KB
-
MD5
d2deba8069e59eb95e01e4a75b990d1e
-
SHA1
18482ef43e3c7289148d2f2ee711113d50ff1238
-
SHA256
c01c6c27460dd0a760d1483e34585c1dbd941e19585be586e88bcb1ddb9344b9
-
SHA512
7fb6fbebbb18099f05855689403d931807277f25cadefb196dc71db1dc84a678d4306e0eea7eb3b8fa9fb48107e16f637e2ec7cac417aaa1c89d18fde47b2676
-
SSDEEP
384:Bhn6d/dkKLbVzAgPwuce6OZQU/S7W2kZ1qjYE0W:75gove6Ox6f4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d2deba8069e59eb95e01e4a75b990d1e_JaffaCakes118
Files
-
d2deba8069e59eb95e01e4a75b990d1e_JaffaCakes118.exe windows:4 windows x86 arch:x86
845ccd712ea6a3d315770de0797b3f27
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSASocketA
setsockopt
htonl
sendto
inet_addr
gethostbyname
recv
WSACleanup
WSAGetLastError
closesocket
WSAStartup
socket
htons
connect
send
WSAAsyncSelect
kernel32
GetModuleHandleA
FreeLibrary
GetStartupInfoA
GetProcAddress
LoadLibraryA
Process32Next
GetCurrentProcessId
Process32First
CreateToolhelp32Snapshot
GetTickCount
SetFileAttributesA
ResumeThread
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
GetSystemDirectoryA
CloseHandle
LocalFree
MapViewOfFile
UnmapViewOfFile
GetVersionExA
ExitProcess
CopyFileA
Sleep
DeleteFileA
GetLastError
CreateMutexA
CreateThread
GlobalMemoryStatus
GetComputerNameA
HeapAlloc
GetProcessHeap
MoveFileExA
user32
wsprintfA
DefWindowProcA
ExitWindowsEx
PostQuitMessage
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
advapi32
DeleteService
LookupPrivilegeValueA
OpenSCManagerA
CreateServiceA
OpenServiceA
CloseServiceHandle
StartServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceCtrlDispatcherA
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
OpenProcessToken
AdjustTokenPrivileges
msvcrt
__dllonexit
malloc
sprintf
printf
__CxxFrameHandler
strcspn
atoi
_onexit
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_exit
_XcptFilter
exit
_acmdln
_initterm
_strlwr
_itoa
rand
strncpy
??2@YAPAXI@Z
_stricmp
strstr
__getmainargs
msvcp60
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE