Static task
static1
Behavioral task
behavioral1
Sample
3cb508468b8c85bf12ae9e2d4eb1c4c9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3cb508468b8c85bf12ae9e2d4eb1c4c9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3cb508468b8c85bf12ae9e2d4eb1c4c9_JaffaCakes118
-
Size
84KB
-
MD5
3cb508468b8c85bf12ae9e2d4eb1c4c9
-
SHA1
c862e80518e1062030326a1ec999b1aaa9b1706a
-
SHA256
0e400bf98949dca8c5ea2ae0d24b53ad042f618425ee749740dc082315bfb277
-
SHA512
2967368be243b1f0584d802a23dfbfa0a4afba059cbdc1f836ccdb0572efdb939e0c7aff00b228c78469565cf8f0ac1d449c5411db4dfe676a320629255c93dd
-
SSDEEP
1536:ouDO4m7TIhLx9Clz7mi/wjYx8//o3LB0ix2qIP5:ZAIhLxgXmi/wjYxIw2ix5IP5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3cb508468b8c85bf12ae9e2d4eb1c4c9_JaffaCakes118
Files
-
3cb508468b8c85bf12ae9e2d4eb1c4c9_JaffaCakes118.exe windows:5 windows x86 arch:x86
5647818262ddaa6d1cbde4af1bba4319
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegEnumKeyA
RegSetValueExA
ws2_32
inet_addr
ntohs
sendto
recv
connect
select
WSAGetLastError
htons
socket
__WSAFDIsSet
closesocket
gethostbyname
send
WSAStartup
ioctlsocket
user32
CharLowerA
CharUpperA
CharUpperBuffA
wsprintfA
wvsprintfA
kernel32
HeapSize
RtlUnwind
HeapReAlloc
VirtualAlloc
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
EnterCriticalSection
LeaveCriticalSection
GetStringTypeW
lstrlenA
WaitForSingleObject
GetTickCount
WideCharToMultiByte
CreateProcessA
GetTimeZoneInformation
GetProcAddress
GetLocalTime
LoadLibraryA
GetModuleHandleA
CloseHandle
ExitProcess
CreateFileA
SystemTimeToFileTime
GetSystemTimeAsFileTime
WriteFile
Sleep
GetFileAttributesA
GetSystemDirectoryA
lstrcatA
ExitThread
GetLastError
CopyFileA
SetFileAttributesA
GetModuleFileNameA
CreateMutexA
GetTempPathA
DeleteFileA
CreateThread
lstrcpyA
lstrcmpA
lstrcpynA
HeapAlloc
InterlockedIncrement
InterlockedDecrement
HeapFree
GetProcessHeap
lstrcmpiA
GlobalFree
GetFileSize
GlobalAlloc
ReadFile
GetTempFileNameA
MapViewOfFile
UnmapViewOfFile
GetCurrentThread
GetWindowsDirectoryA
GetDriveTypeA
GetEnvironmentVariableA
SetThreadPriority
FindFirstFileA
FindClose
CreateFileMappingA
FindNextFileA
SetFilePointer
GetSystemTime
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
Sections
.text Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE