Static task
static1
Behavioral task
behavioral1
Sample
04e284b1a52219ebd90a8567914747b7_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
04e284b1a52219ebd90a8567914747b7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
04e284b1a52219ebd90a8567914747b7_JaffaCakes118
-
Size
124KB
-
MD5
04e284b1a52219ebd90a8567914747b7
-
SHA1
59d93a7fa5004224c2ead8eb560c2eb146d5f5c6
-
SHA256
0eb5415884bc56e7a424c7c6910f5eaefa52955b220c39fca8fdfeaa9f25dc12
-
SHA512
4231e7fe56671f1ee6796038ad1211e882cd3bf4e629886b94b5cf064673b3cdf954916222872e3611be434d671c0ebafe991c6ed538c29b7f053edb5c621e1f
-
SSDEEP
3072:aZXS55JHPUTTBfsdbvJfzhImmYDWGFtWrifD:/5VPUTTBGbxuVYDWsX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04e284b1a52219ebd90a8567914747b7_JaffaCakes118
Files
-
04e284b1a52219ebd90a8567914747b7_JaffaCakes118.exe windows:4 windows x86 arch:x86
c6247c8ef89061463c059e34e65db2f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
PostMessageA
ws2_32
recv
send
gethostname
socket
setsockopt
htons
WSACleanup
WSAStartup
connect
gethostbyname
WSAGetLastError
closesocket
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIPBDI@Z
?compare@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEHIIPBDI@Z
?find_last_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Xlen@std@@YAXXZ
msvcrt
islower
strcpy
rand
time
malloc
free
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
strcat
sscanf
memcpy
memset
strlen
__CxxFrameHandler
srand
memchr
_snprintf
??2@YAPAXI@Z
shell32
ShellExecuteA
netapi32
Netbios
kernel32
CreateThread
WaitForSingleObject
GetLocalTime
GetWindowsDirectoryA
SetFilePointer
GetCurrentDirectoryA
SetCurrentDirectoryA
DeleteFileA
SetEndOfFile
ReadFile
GetStartupInfoA
GetModuleHandleA
OutputDebugStringA
CloseHandle
CreateFileA
GetModuleFileNameA
Sleep
WriteFile
imagehlp
MakeSureDirectoryPathExists
shlwapi
PathFileExistsA
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE