Static task
static1
Behavioral task
behavioral1
Sample
04047c6a4045173933d328fb2a9fe5a8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
04047c6a4045173933d328fb2a9fe5a8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
04047c6a4045173933d328fb2a9fe5a8_JaffaCakes118
-
Size
17KB
-
MD5
04047c6a4045173933d328fb2a9fe5a8
-
SHA1
9b21e322d36f5bfe3a2f892821a1e8fc53db3a3b
-
SHA256
f34eda9ce4d334663ec68c433e92d1332a67c4d1f2d0191b807059969e6be84c
-
SHA512
7ebcf64993020ce13f93df33677e2b294fe884edb923b3abe22bcc43183504e88e7fbcf7af1297f1b5b551bf164e1bdc989d570f5f5953cdcbd41da6983f82eb
-
SSDEEP
384:I7I4q96h9Z67+JcQ4ubjKFXh3tHqyzWq6egrJAo:Is4K6hW7FXhxzWnJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04047c6a4045173933d328fb2a9fe5a8_JaffaCakes118
Files
-
04047c6a4045173933d328fb2a9fe5a8_JaffaCakes118.exe windows:4 windows x86 arch:x86
572ec09ef0cae588abbddc3e8dd19e21
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord823
ord536
ord941
ord356
ord2770
ord668
ord2781
ord4058
ord2915
ord3181
ord3178
ord540
ord2846
ord2818
ord537
ord2764
ord6648
ord4129
ord800
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
printf
rand
srand
time
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_except_handler3
__CxxFrameHandler
strncmp
atoi
strstr
strchr
sprintf
exit
_strcmpi
kernel32
GetVersionExA
DeleteFileA
GetSystemDirectoryA
WaitForSingleObject
ResumeThread
SetThreadPriority
GetCurrentThread
SetPriorityClass
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
CloseHandle
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
GlobalMemoryStatus
GetCurrentProcess
GetStartupInfoA
CopyFileA
GetLastError
lstrlenA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetModuleHandleA
ExitThread
Sleep
GetCurrentProcessId
GetTickCount
HeapAlloc
GetProcessHeap
CreateThread
CreateProcessA
GetProcAddress
user32
wsprintfA
comdlg32
GetFileTitleA
advapi32
DeleteService
OpenSCManagerA
SetServiceStatus
RegisterServiceCtrlHandlerA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
StartServiceCtrlDispatcherA
RegOpenKeyExA
RegCloseKey
CloseServiceHandle
RegSetValueExA
RegOpenKeyA
StartServiceA
CreateServiceA
OpenServiceA
ws2_32
sendto
setsockopt
WSASocketA
inet_addr
htons
WSAStartup
gethostbyname
gethostname
htonl
recv
send
connect
socket
inet_ntoa
closesocket
WSAGetLastError
__WSAFDIsSet
select
urlmon
URLDownloadToFileA
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE