Static task
static1
Behavioral task
behavioral1
Sample
e2259337cef13c8d293a4c9418d5f551_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2259337cef13c8d293a4c9418d5f551_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e2259337cef13c8d293a4c9418d5f551_JaffaCakes118
-
Size
72KB
-
MD5
e2259337cef13c8d293a4c9418d5f551
-
SHA1
4b63cc49ae478f855231688d182710d88b3ed930
-
SHA256
39c99a607da3142cd33e3b0d8628e97cae7a6e36d4a4a30bccb6ed5ebdaa80f8
-
SHA512
0bfc923af63d61887dcd3c16a2bf9cda8ff907cc50cf22a0548e41c501a78021024056c623f149c230a9a26e77fadbd1a5571f25e3d21406ac86201edfa55679
-
SSDEEP
1536:duJtfar0LBmmbIiP+L3Lhjl2MV6z8G/ZmZ8wVYL5to:dMtfar0dmmU6+rhlxyRmZ8wVYL5to
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e2259337cef13c8d293a4c9418d5f551_JaffaCakes118
Files
-
e2259337cef13c8d293a4c9418d5f551_JaffaCakes118.exe windows:4 windows x86 arch:x86
c4e07b71b2f071f199a15298359845a0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
inet_addr
connect
socket
htons
bind
listen
recv
send
closesocket
WSAAsyncSelect
ioctlsocket
accept
WSAStartup
kernel32
LoadLibraryA
GetProcAddress
GetOEMCP
GetACP
GetCPInfo
CreateFileA
FlushFileBuffers
SetStdHandle
CloseHandle
TerminateProcess
GetExitCodeProcess
OpenProcess
CopyFileA
SetEndOfFile
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
RtlUnwind
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
ReadFile
GetFileType
GetStdHandle
SetHandleCount
LCMapStringW
LCMapStringA
CompareStringA
CompareStringW
GetModuleFileNameA
HeapFree
SetFilePointer
WriteFile
GetLastError
WideCharToMultiByte
HeapAlloc
ExitProcess
GetCurrentProcess
SetEnvironmentVariableA
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
user32
GetMessageA
DispatchMessageA
FindWindowA
GetWindowThreadProcessId
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
MessageBoxA
ExitWindowsEx
DefWindowProcA
TranslateMessage
gdi32
GetStockObject
advapi32
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
shell32
ShellExecuteA
winmm
mciSendCommandA
Sections
.text Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ