Static task
static1
Behavioral task
behavioral1
Sample
d711f4f32ff5d5ddbdc66cfefc91c8a6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d711f4f32ff5d5ddbdc66cfefc91c8a6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d711f4f32ff5d5ddbdc66cfefc91c8a6_JaffaCakes118
-
Size
288KB
-
MD5
d711f4f32ff5d5ddbdc66cfefc91c8a6
-
SHA1
d001886f655532989a1d53bafa8f662c7b5a836f
-
SHA256
7bd66d6ae120f3206562228d15c7c7838bc35ec6108f491211d26d9f4313956e
-
SHA512
fa43028c031f3101e3c3a56187fe7debacf01922e6456564b5ff1f83e98bd874d0433bc0dd26dc5da51059d3b7940a4e2806c44f90ce655a55ebaaa6cbc0a231
-
SSDEEP
6144:oy9ctXO3sP4BP5tXD2+IEj83c+8SninE7Qea/6lHSu:oyw4sPCfXDOEQ3xa/M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d711f4f32ff5d5ddbdc66cfefc91c8a6_JaffaCakes118
Files
-
d711f4f32ff5d5ddbdc66cfefc91c8a6_JaffaCakes118.exe windows:4 windows x86 arch:x86
c0081f669aedb32be13b9c3fe47dd993
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
inet_addr
gethostbyname
getpeername
shutdown
closesocket
setsockopt
send
recv
WSAStartup
WSACleanup
socket
WSAGetLastError
ioctlsocket
htons
getservbyname
ntohs
connect
kernel32
GetFullPathNameA
GetCurrentDirectoryA
SetEndOfFile
GetLocaleInfoW
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
LoadLibraryA
SetStdHandle
GetOEMCP
GetACP
CompareStringW
CompareStringA
Sleep
LeaveCriticalSection
EnterCriticalSection
CloseHandle
GetDriveTypeA
WaitNamedPipeA
CreateFileA
GetLastError
GetWindowsDirectoryA
InterlockedIncrement
InitializeCriticalSection
TlsAlloc
DeleteCriticalSection
TlsFree
TlsSetValue
TlsGetValue
ReadFile
WriteFile
SetThreadPriority
CreateSemaphoreA
InterlockedDecrement
WaitForSingleObject
ReleaseSemaphore
SetCurrentDirectoryA
GetFileInformationByHandle
SetNamedPipeHandleState
GetNumberOfConsoleInputEvents
SetConsoleCtrlHandler
ExitProcess
TerminateProcess
GetCurrentProcess
ReadConsoleA
SetConsoleMode
GetConsoleMode
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCommandLineA
GetVersion
HeapAlloc
HeapFree
WideCharToMultiByte
MultiByteToWideChar
ReadConsoleInputA
PeekConsoleInputA
PeekNamedPipe
WriteConsoleA
GetFileAttributesA
HeapReAlloc
FindFirstFileA
FindNextFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
ResumeThread
CreateThread
ExitThread
HeapSize
FatalAppExitA
UnhandledExceptionFilter
GetCurrentThreadId
SetLastError
GetCurrentThread
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FlushFileBuffers
GetProcAddress
GetModuleHandleA
RaiseException
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
VirtualAlloc
IsBadWritePtr
SetEnvironmentVariableW
SetEnvironmentVariableA
GetCPInfo
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
SetFilePointer
advapi32
RegEnumValueA
RegCloseKey
RegOpenKeyExA
Sections
.text Size: 168KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 177KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE