Static task
static1
Behavioral task
behavioral1
Sample
0ca54efdc53f214585d46bd61c8fef74_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0ca54efdc53f214585d46bd61c8fef74_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0ca54efdc53f214585d46bd61c8fef74_JaffaCakes118
-
Size
23KB
-
MD5
0ca54efdc53f214585d46bd61c8fef74
-
SHA1
103e192695d170836e74df74cb5c8b0298a7ddd8
-
SHA256
9dc0be57f055b3da271f22a654efa2fda4436b38e641ed74ed7213def98b432d
-
SHA512
cbbf6a81f4a4eb1257f5410edeab645fa05297b2a5bcb8df9d4c89eec8f6b42d4af7d2790ad02a8d9ba04037632fea5e7aaafb6ffc5714bb5783b48665481447
-
SSDEEP
384:wKXi+yHMuq6p7U1ZGd55GMX/y/KJUsoquYk4cpMMH6t6TqbVOt9yaVWp5+W:rXi+yHMt6p9JGMX/cUSH6tBb4tkF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ca54efdc53f214585d46bd61c8fef74_JaffaCakes118
Files
-
0ca54efdc53f214585d46bd61c8fef74_JaffaCakes118.exe windows:4 windows x86 arch:x86
cf7111ed491ae5fcab82d82dd89afa76
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
WaitForSingleObject
ExitProcess
CreateMutexA
CreateFileA
ResumeThread
CopyFileA
GetSystemDirectoryA
GlobalMemoryStatusEx
GetComputerNameA
GetLocaleInfoW
DeviceIoControl
TerminateProcess
ExitThread
GetTickCount
GetStartupInfoA
GetModuleHandleA
OpenMutexA
ReleaseMutex
CloseHandle
GetTempPathA
WinExec
GetLastError
GetModuleFileNameA
SetFileAttributesA
LoadLibraryA
GetProcAddress
CreateThread
Sleep
lstrlenA
user32
GetDesktopWindow
wsprintfA
advapi32
RegQueryValueExA
CreateServiceA
StartServiceA
RegOpenKeyA
RegSetValueExA
CloseServiceHandle
RegCloseKey
RegOpenKeyExA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenSCManagerA
OpenServiceA
DeleteService
shell32
ShellExecuteA
ws2_32
recv
setsockopt
WSAIoctl
__WSAFDIsSet
socket
gethostname
closesocket
select
send
WSAStartup
inet_ntoa
htons
gethostbyname
inet_addr
sendto
WSASocketA
htonl
connect
msvcrt
strcat
rand
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_except_handler3
malloc
realloc
memcpy
strstr
memset
atoi
strcpy
strncpy
strcspn
exit
sprintf
strncmp
strlen
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ