Static task
static1
Behavioral task
behavioral1
Sample
dfee0aa1f8e65cfa92e29435e7940db4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dfee0aa1f8e65cfa92e29435e7940db4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dfee0aa1f8e65cfa92e29435e7940db4_JaffaCakes118
-
Size
40KB
-
MD5
dfee0aa1f8e65cfa92e29435e7940db4
-
SHA1
f4904dd2bc4827bebb675ffd73c42eb31467ac8d
-
SHA256
a5502854f6de87457c79d9a99e0aece1a99bd730ad3ffa489fc036415c69716e
-
SHA512
6144f217b0b56a5d2a671a5bc02ff6b9996012d7e759048cb17164638f7de64de6bddd56d91aa5dfaa443c284f686240038fa7e3b6cb41e5b4a4f852b7ed5144
-
SSDEEP
384:jK9PavPL4BuOuEbfD9nb/sPdv8XQxgnCNcmOnuBwKDQckRKDVbJapdKDGPGAf:2cvlOP5b/Kv8XQZNcfnuBr90PG2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dfee0aa1f8e65cfa92e29435e7940db4_JaffaCakes118
Files
-
dfee0aa1f8e65cfa92e29435e7940db4_JaffaCakes118.exe windows:4 windows x86 arch:x86
00d1696cec00b66775f871a6aadece9e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDesktopWindow
wsprintfA
advapi32
RegQueryValueExA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegCloseKey
RegSetValueExA
RegCreateKeyA
RegOpenKeyA
StartServiceCtrlDispatcherA
ws2_32
recv
select
__WSAFDIsSet
shutdown
send
WSACleanup
gethostbyname
socket
setsockopt
htons
connect
closesocket
WSAStartup
inet_addr
inet_ntoa
rpcrt4
UuidToStringA
UuidCreate
RpcStringFreeA
msvcp60
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1runtime_error@std@@UAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0runtime_error@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
?_Doraise@runtime_error@std@@MBEXXZ
?what@runtime_error@std@@UBEPBDXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
msvcrt
_XcptFilter
__p__commode
_adjust_fdiv
__setusermatherr
_controlfp
_except_handler3
__set_app_type
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
strncmp
_itoa
sscanf
_strnicmp
_strcmpi
rand
srand
exit
_stricmp
__p___argv
__p___argc
free
__dllonexit
_onexit
??1type_info@@UAE@XZ
_exit
_initterm
_acmdln
__getmainargs
__p__fmode
kernel32
GetStartupInfoA
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
GetTickCount
CreateMutexA
Sleep
lstrcpynA
GetTempPathA
GetTempFileNameA
CreateThread
WaitForSingleObject
ReleaseMutex
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ