Static task
static1
Behavioral task
behavioral1
Sample
0031810bb700a16fa7b4a000597f9881_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0031810bb700a16fa7b4a000597f9881_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0031810bb700a16fa7b4a000597f9881_JaffaCakes118
-
Size
636KB
-
MD5
0031810bb700a16fa7b4a000597f9881
-
SHA1
2d9fd25efa416afc6b2cbe525ddd80a1dd7ace88
-
SHA256
d7a93a60637252c06ffae6b0eb0b483bc9ba1ca82b445d54e421d92e31e7dcc9
-
SHA512
8a7153eacce6d5bf147e030ce8fc9196f7e345588a8c1892f99b595b7c62c105022c9b4253931139f1a2f6542e6ed8e6f6e8fb1a87f2cbe1f67fccab713d41a9
-
SSDEEP
6144:soAQYUwX9sXA5hJyDdNn+07Q49L6mr6IQ6QxHXO4Ws:so3YUsfhJ6dN+eum2fF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0031810bb700a16fa7b4a000597f9881_JaffaCakes118
Files
-
0031810bb700a16fa7b4a000597f9881_JaffaCakes118.exe windows:4 windows x86 arch:x86
90f2da220aa5655e5ac1b84c83572b2f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
user32
SendMessageA
EnumChildWindows
EnumWindows
GetClassNameA
ws2_32
socket
setsockopt
ioctlsocket
htons
bind
WSAStartup
send
select
__WSAFDIsSet
accept
recv
closesocket
WSACleanup
connect
inet_addr
listen
kernel32
lstrcmpiA
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
IsBadCodePtr
IsBadReadPtr
SetStdHandle
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
FlushFileBuffers
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetFilePointer
Sleep
GetLastError
CreateThread
GetModuleFileNameA
ExitThread
LeaveCriticalSection
EnterCriticalSection
GetTickCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetLocalTime
QueryPerformanceCounter
QueryPerformanceFrequency
ExitProcess
CreateProcessA
CloseHandle
WriteFile
CreateFileA
GetSystemDirectoryA
FindClose
FindNextFileA
FindFirstFileA
LoadLibraryA
GetProcAddress
GetModuleHandleA
FormatMessageA
GlobalUnlock
GlobalLock
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SetFileTime
GetFileTime
ExpandEnvironmentStringsA
SetFileAttributesA
GetFileAttributesA
GetTempPathA
WideCharToMultiByte
MultiByteToWideChar
GetComputerNameA
GetCurrentProcess
TerminateProcess
OpenProcess
GetLocaleInfoA
GetVersionExA
GetLogicalDrives
TerminateThread
ReadFile
GlobalMemoryStatus
GetTimeFormatA
GetDateFormatA
DeleteFileA
GetCurrentProcessId
CopyFileA
WaitForSingleObject
CreateMutexA
MoveFileA
TransactNamedPipe
HeapFree
HeapReAlloc
HeapAlloc
GetTimeZoneInformation
GetSystemTime
RtlUnwind
GetStartupInfoA
GetCommandLineA
GetVersion
RaiseException
HeapSize
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetCPInfo
GetACP
GetOEMCP
Sections
Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 392KB - Virtual size: 392KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE