Static task
static1
Behavioral task
behavioral1
Sample
1342dfd8a7b46df4936a0dbe50f39071_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1342dfd8a7b46df4936a0dbe50f39071_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1342dfd8a7b46df4936a0dbe50f39071_JaffaCakes118
-
Size
52KB
-
MD5
1342dfd8a7b46df4936a0dbe50f39071
-
SHA1
f5ef07d03ba779a5132c9e4c6ff0ac22502ea9b9
-
SHA256
9dd603221b23091fc6be1fc0ea5846046a6a2a451f32efd251d6e5d024f362ca
-
SHA512
31f792c3c1bf8a2f50e5f606fbc8951c2b13f1f26f3aba740ba486beee0f3fa18a88252645701f8ad79b4739279ef3187b6f5b14a0fd6990a2f4ce61eb771578
-
SSDEEP
768:nI6QfS1M2ydesNXlC69PvkPcJCSJx78jOpeis93Dp3Z/clY1:IvIM24lPPge79peis93DT/clY1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1342dfd8a7b46df4936a0dbe50f39071_JaffaCakes118
Files
-
1342dfd8a7b46df4936a0dbe50f39071_JaffaCakes118.exe windows:4 windows x86 arch:x86
32f6b10910a16015ec1adbc19118d46a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
accept
gethostname
gethostbyname
WSACleanup
send
bind
setsockopt
htons
htonl
socket
closesocket
listen
recv
shutdown
ioctlsocket
WSAStartup
mfc42
ord1979
ord5572
ord2915
ord5442
ord3318
ord5186
ord354
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord815
ord561
ord641
ord6117
ord2621
ord1134
ord2725
ord665
ord4998
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord3597
ord1146
ord324
ord4234
ord5953
ord1779
ord5951
ord3521
ord4710
ord6453
ord4220
ord2584
ord3654
ord2438
ord6270
ord2863
ord1644
ord3663
ord6215
ord2645
ord6403
ord3097
ord4055
ord1576
ord3095
ord5232
ord1567
ord2393
ord6197
ord5718
ord3797
ord2147
ord2864
ord1180
ord268
ord1568
ord5268
ord2818
ord6374
ord2642
ord3092
ord940
ord858
ord540
ord860
ord941
ord539
ord939
ord537
ord6877
ord3522
ord924
ord922
ord800
ord1168
ord823
ord825
ord5265
ord6402
msvcrt
_onexit
__dllonexit
strrchr
_purecall
strstr
sscanf
??1type_info@@UAE@XZ
atoi
wcscmp
strncmp
strncpy
__CxxFrameHandler
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_controlfp
_setmbcp
_except_handler3
__set_app_type
_initterm
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
isdigit
_strnicmp
_itoa
_strlwr
_CxxThrowException
kernel32
LocalFree
GetModuleFileNameA
GetStartupInfoA
GetModuleHandleA
FindResourceA
LoadResource
LockResource
SetCurrentDirectoryA
GetProcAddress
LoadLibraryA
lstrlenA
lstrcmpA
lstrcmpiA
Sleep
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
CreateThread
CreateEventA
WaitForSingleObject
ResetEvent
SetEvent
GetLastError
CreateMutexA
FreeLibrary
user32
SetForegroundWindow
GetSubMenu
GetCursorPos
RegisterWindowMessageA
LoadIconA
LoadMenuA
IsWindowVisible
SetActiveWindow
GetActiveWindow
EnableWindow
MessageBoxA
SetMenuDefaultItem
IsWindowEnabled
SendMessageA
advapi32
RegQueryValueExA
RegSetValueExA
RegOpenKeyA
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
shell32
Shell_NotifyIconA
ShellExecuteA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
OleRun
oleaut32
SysAllocString
SysFreeString
msvcp60
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Xlen@std@@YAXXZ
?max_size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE