Static task
static1
Behavioral task
behavioral1
Sample
d4a4d832bbf3f70a0aa9dee8c7532037_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d4a4d832bbf3f70a0aa9dee8c7532037_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4a4d832bbf3f70a0aa9dee8c7532037_JaffaCakes118
-
Size
172KB
-
MD5
d4a4d832bbf3f70a0aa9dee8c7532037
-
SHA1
bea17cdeb0b0f380fb40c574b498b5bff4fefe99
-
SHA256
65e67a10b0eedaf6c7b5535ab18d520d37b030efe9f679114f81f92fb0c8a735
-
SHA512
4b213e78630a898a1d399163c1fca824689437d8744fe19476f0d2a8c48a8d641cc32c6f79cfa36fb5f2520f99f6dd45c14104746e38ae34831c183ba61daf85
-
SSDEEP
3072:LQVrIuZzjHmdPvqY/oaXed06C9AV8yv39C3hebDtTBf0KmJpstN:LArIuxjHmQiXC039Yvv3M3MbDtTBMPX0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4a4d832bbf3f70a0aa9dee8c7532037_JaffaCakes118
Files
-
d4a4d832bbf3f70a0aa9dee8c7532037_JaffaCakes118.exe windows:4 windows x86 arch:x86
e50b0527fb65b54fe9e59cb9b5e3960e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
socket
WSAIoctl
closesocket
gethostname
bind
WSAStartup
WSACleanup
htons
sendto
WSASetEvent
ntohs
WSAGetLastError
recvfrom
getsockname
shutdown
connect
send
gethostbyname
recv
kernel32
DeleteFileA
ReadFile
CreateFileA
GetTempPathA
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
GetWindowsDirectoryA
FindClose
FindFirstFileA
CreateEventA
TerminateThread
WaitForSingleObject
SetEvent
CreateThread
WriteFile
ResetEvent
WaitForMultipleObjects
SetFilePointer
GetShortPathNameA
OpenProcess
CreateDirectoryA
GetFileSize
GetTickCount
SetFileAttributesA
GetFileAttributesA
InitializeCriticalSection
GetExitCodeThread
OpenEventA
CloseHandle
SetNamedPipeHandleState
Sleep
GetModuleFileNameA
DeleteCriticalSection
GetStartupInfoA
GetModuleHandleA
GlobalAlloc
GlobalFree
GetQueuedCompletionStatus
FindNextFileA
GetCurrentProcessId
GetLongPathNameA
GetVolumeInformationA
GetDriveTypeA
CreateProcessA
DuplicateHandle
GetCurrentProcess
CreatePipe
GetExitCodeProcess
HeapCreate
HeapDestroy
HeapAlloc
HeapFree
HeapUnlock
HeapWalk
EnterCriticalSection
HeapLock
CreateIoCompletionPort
PostQueuedCompletionStatus
LeaveCriticalSection
shell32
ShellExecuteA
SHFileOperationA
gdiplus
GdipAlloc
GdiplusShutdown
GdiplusStartup
GdipFree
GdipLoadImageFromFile
GdipSaveImageToFile
GdipDisposeImage
GdipGetImageEncodersSize
GdipGetImageEncoders
GdipCloneImage
mfc42
ord3663
ord3626
ord2414
ord640
ord665
ord1979
ord5186
ord354
ord5785
ord1641
ord1640
ord323
ord800
ord1601
ord537
ord3571
msvcrt
free
wcscmp
_strupr
_strset
__CxxFrameHandler
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
pow
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
__dllonexit
_onexit
_controlfp
sprintf
isspace
isdigit
malloc
_purecall
_ftol
rand
srand
memcmp
strchr
memcpy
strlen
strrchr
_CxxThrowException
memset
strcpy
strstr
__setusermatherr
strcmp
??1type_info@@UAE@XZ
user32
DestroyWindow
FindWindowA
PostMessageA
GetDesktopWindow
GetWindow
GetWindowThreadProcessId
GetWindowLongA
GetWindowTextA
GetMessageA
PostThreadMessageA
SendMessageA
IsWindow
GetSystemMetrics
gdi32
GetDIBits
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
CreateDCA
GetObjectA
Sections
.text Size: 124KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ