Static task
static1
Behavioral task
behavioral1
Sample
0e56af2e8c66cc8b34d4fcee4ecb0972_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0e56af2e8c66cc8b34d4fcee4ecb0972_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0e56af2e8c66cc8b34d4fcee4ecb0972_JaffaCakes118
-
Size
27KB
-
MD5
0e56af2e8c66cc8b34d4fcee4ecb0972
-
SHA1
a2b294cdbfde65ba9004f70b8a99e2dcb25fa875
-
SHA256
e902532946b3381368934bc2c846cbf35fe212bd6bb82d95c56bef20b31fcdcc
-
SHA512
e55627b07f2462b290060518f703216ed043e1e1adf448ea77ea4f157fad1b4ac8def30a3cc1552771405e0cf0db940da5ad5af272230e5a166c82eedc20b650
-
SSDEEP
384:NfOmZEtryjJzQWyACj1GLZx+iTLTiskRI9wWlCEMpxkqrD35SN3XK9ejYE0Wm:J8tejJZqGLZx++LTisYIeaUD35SpXK3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e56af2e8c66cc8b34d4fcee4ecb0972_JaffaCakes118
Files
-
0e56af2e8c66cc8b34d4fcee4ecb0972_JaffaCakes118.exe windows:4 windows x86 arch:x86
abf7a54bc042025ae2739b4dfe057815
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSASocketA
htonl
sendto
inet_addr
WSAGetLastError
WSAAsyncSelect
WSAStartup
getprotobyname
socket
gethostbyname
setsockopt
htons
connect
send
recv
closesocket
WSACleanup
kernel32
WriteProcessMemory
GetProcAddress
GetModuleHandleA
VirtualProtectEx
VirtualAllocEx
VirtualAlloc
lstrcatA
HeapFree
HeapAlloc
GetProcessHeap
SetThreadContext
WideCharToMultiByte
MultiByteToWideChar
GetSystemDirectoryA
GetTickCount
SetPriorityClass
GetCurrentProcess
FreeLibrary
GetCurrentProcessId
LoadLibraryA
GetVersion
CreateThread
Sleep
CloseHandle
CreateMutexA
ExitProcess
GetCommandLineA
GetModuleFileNameA
DeleteFileA
MoveFileA
ResumeThread
GetVersionExA
GetComputerNameA
GetFileAttributesA
GetCurrentThreadId
WriteFile
CreateFileA
TerminateProcess
CreateProcessA
GetThreadContext
ReadProcessMemory
VirtualQueryEx
GetStartupInfoA
GetLastError
GlobalMemoryStatus
user32
DefWindowProcA
ExitWindowsEx
PostQuitMessage
RegisterClassA
PostThreadMessageA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
GetInputState
CreateWindowExA
advapi32
RegSetValueA
RegSetValueExA
LookupPrivilegeValueA
RegCloseKey
GetUserNameA
LookupAccountNameA
GetFileSecurityA
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
InitializeAcl
AddAce
GetAce
EqualSid
AddAccessAllowedAce
SetSecurityDescriptorDacl
AdjustTokenPrivileges
RegDeleteKeyA
RegOpenKeyA
RegCreateKeyA
SetFileSecurityA
GetSecurityDescriptorControl
OpenProcessToken
msvcp60
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
netapi32
NetApiBufferFree
NetUserGetLocalGroups
msvcrt.dll�
_itoa
ftell
fseek
fclose
fopen
fread
sprintf
rand
strstr
atoi
strncpy
strcspn
__CxxFrameHandler
malloc
_strlwr
_except_handler3
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
ZIJIAN Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE