Static task
static1
Behavioral task
behavioral1
Sample
df4d3acb6b0c4e04a232246d31a6d41d_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
df4d3acb6b0c4e04a232246d31a6d41d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
df4d3acb6b0c4e04a232246d31a6d41d_JaffaCakes118
-
Size
29KB
-
MD5
df4d3acb6b0c4e04a232246d31a6d41d
-
SHA1
f75cc6ae8317604d1fa274937b70fc67ed1de4b9
-
SHA256
4443e3272be38d9401a5b3ddda517f425ce3692cdf15e652c57f872c1a6b6298
-
SHA512
8c361a47325cc5bb8d2bfee5e3787613aed705f801ac08fc5e9251e088c502042545aaba8eeb061f934a9ac2c3e0f99cedaa5500a5c4cec6f6c18a58bccab4f9
-
SSDEEP
384:nh9J6M8ro5RhmKHShTz9+++O8H7eOKB8dTZP7lTi1j5Tz4zszwNmY3Wa2YJW0VWJ:hhmkRhmLMcTDGZTqld0NmGWE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df4d3acb6b0c4e04a232246d31a6d41d_JaffaCakes118
Files
-
df4d3acb6b0c4e04a232246d31a6d41d_JaffaCakes118.exe windows:5 windows x86 arch:x86
3d1cad531f4aa8bef97dda88cb1bb700
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
atoi
wcscpy
wcslen
memmove
_stricmp
_c_exit
_exit
_XcptFilter
_cexit
exit
__initenv
__getmainargs
_initterm
_strnicmp
advapi32
RegNotifyChangeKeyValue
RegEnumKeyW
RegOpenKeyExW
RegisterEventSourceA
ReportEventA
DeregisterEventSource
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegEnumValueA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegEnumValueW
RegQueryValueExW
RegSetValueExW
RegDeleteValueW
kernel32
LoadLibraryExA
GetProcAddress
WaitForSingleObject
FreeLibrary
DeleteCriticalSection
CreateThread
WaitForSingleObjectEx
GetModuleHandleA
HeapAlloc
HeapFree
CreateEventA
Sleep
lstrcmpiA
CloseHandle
WaitForMultipleObjects
ExpandEnvironmentStringsA
GetLastError
SetEvent
LeaveCriticalSection
EnterCriticalSection
ResumeThread
SetConsoleCtrlHandler
GetTickCount
InitializeCriticalSection
HeapCreate
HeapDestroy
MultiByteToWideChar
snmpapi
SnmpSvcAddrToSocket
SnmpUtilMemReAlloc
SnmpSvcInitUptime
SnmpUtilUnicodeToUTF8
SnmpSvcGetUptime
SnmpUtilAsnAnyCpy
SnmpSvcGetEnterpriseOID
SnmpUtilOidNCmp
SnmpUtilOidCmp
SnmpUtilVarBindFree
SnmpUtilOidFree
SnmpUtilOidCpy
SnmpUtilVarBindCpy
SnmpUtilOctetsCpy
SnmpUtilVarBindListFree
SnmpUtilMemAlloc
SnmpUtilOctetsCmp
SnmpUtilOctetsFree
SnmpSvcSetLogLevel
SnmpSvcSetLogType
SnmpUtilMemFree
ws2_32
bind
htons
getservbyname
WSASocketA
ntohl
inet_addr
WSASendTo
WSAGetLastError
WSARecvFrom
WSAStartup
WSACleanup
WSAIoctl
closesocket
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ