lhxXfY9mIrDZ
Static task
static1
Behavioral task
behavioral1
Sample
d0bf0f2bbab07b5e42906dc98799da19_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d0bf0f2bbab07b5e42906dc98799da19_JaffaCakes118
-
Size
238KB
-
MD5
d0bf0f2bbab07b5e42906dc98799da19
-
SHA1
b718d5cf9d9f1508480aad16b37d6eb8ae5fddb9
-
SHA256
bb7f75d4166ae8700865cd820e844288bc20d47ac5a7addfcd70355dfdd60dc0
-
SHA512
c8986dad151c9288c71320bdcc1776f26dfed9800e14babdd3caca415fa1915f9756d6c81d6f46d61c0bc9d849a4a7209692a49ac349dcc60158abab13313a26
-
SSDEEP
3072:qqZJ0hB+tY7Y+ELd7wN2sWDeAn6hbpfXsJ4p3:qqZJ0h8tOYVL6ESYYbpP84N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d0bf0f2bbab07b5e42906dc98799da19_JaffaCakes118
Files
-
d0bf0f2bbab07b5e42906dc98799da19_JaffaCakes118.exe windows:4 windows x86 arch:x86
957e7f4e0923b1fa2719bafbe8f87147
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
gethostbyaddr
ntohl
setsockopt
htonl
bind
sendto
recvfrom
inet_addr
gethostname
inet_ntoa
WSAGetLastError
WSAStartup
gethostbyname
socket
htons
connect
closesocket
WSACleanup
send
recv
comctl32
ImageList_Create
ord17
ImageList_GetImageCount
ImageList_ReplaceIcon
PropertySheetA
mpr
WNetAddConnection2A
WNetCancelConnection2A
WNetCancelConnectionA
kernel32
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LocalFree
FormatMessageA
lstrcpyA
lstrcatW
SetLastError
lstrlenW
MultiByteToWideChar
GetProcAddress
GetCurrentThreadId
LoadLibraryA
GetVersionExA
Sleep
GetCurrentProcess
WaitForMultipleObjects
CreateThread
TerminateThread
VirtualAlloc
WideCharToMultiByte
lstrlenA
LocalAlloc
WritePrivateProfileStringA
GetPrivateProfileStringA
GetModuleFileNameA
FreeLibrary
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
GetLastError
GetSystemTimeAsFileTime
GetCurrentProcessId
user32
EnableWindow
LoadCursorA
LoadIconA
RegisterClassA
GetMessageA
TranslateMessage
DispatchMessageA
GetWindowRect
GetDlgItem
SetWindowPos
PostQuitMessage
GetMessagePos
MapWindowPoints
LoadMenuA
ClientToScreen
GetSubMenu
ModifyMenuA
TrackPopupMenu
DestroyMenu
DialogBoxParamA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetSystemMenu
AppendMenuA
CheckDlgButton
IsDlgButtonChecked
SetDlgItemTextA
MessageBoxA
SetWindowTextA
SendMessageA
PostMessageA
ShowWindow
GetDlgItemTextA
EndDialog
EnableMenuItem
gdi32
DeleteObject
advapi32
OpenSCManagerA
OpenServiceA
CloseServiceHandle
RegConnectRegistryA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegEnumKeyExA
RegQueryInfoKeyA
RegEnumValueA
AbortSystemShutdownA
InitiateSystemShutdownA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
EnumServicesStatusA
shell32
ShellExecuteA
msvcr80
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
strrchr
isdigit
_crt_debugger_hook
atol
realloc
mbstowcs
asctime
_gmtime64
free
strncpy
_acmdln
atoi
malloc
memcpy
perror
strncat
toupper
memset
sprintf
_decode_pointer
_adjust_fdiv
__p__commode
_except_handler4_common
_invoke_watson
_controlfp_s
__p__fmode
_encode_pointer
__set_app_type
_onexit
_initterm
__setusermatherr
sscanf
_configthreadlocale
_unlock
__dllonexit
_initterm_e
_lock
_stricmp
Exports
Exports
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ