Static task
static1
Behavioral task
behavioral1
Sample
412e1c8eebb7fd98bf5fe7fa0f173888_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
412e1c8eebb7fd98bf5fe7fa0f173888_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
412e1c8eebb7fd98bf5fe7fa0f173888_JaffaCakes118
-
Size
6KB
-
MD5
412e1c8eebb7fd98bf5fe7fa0f173888
-
SHA1
94634d5b582be242e96a64afa7d3eb0740d63632
-
SHA256
b05d274584c19a6fa4f953c194e32b596f136dbcf606ccec6b2362ae4e675d80
-
SHA512
aec7b094e03829bc80e426e6069010b991416040004297c24b8760a947a11dfa66f8b4ab66dd14ab30ec2994220218608dfab18d590be4720d9f9e5d3db0fea8
-
SSDEEP
96:RkVYuT/zf6l5LKOb7sK0E0O1fOI5liiVFXRXVFX+AerktNPtboyilUMjsBW+lWn8:KqMz63b88fJ/VPXVN0INP1oyilUMjsB6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 412e1c8eebb7fd98bf5fe7fa0f173888_JaffaCakes118
Files
-
412e1c8eebb7fd98bf5fe7fa0f173888_JaffaCakes118.exe windows:4 windows x86 arch:x86
0b752d65779720c1f5190e1190acfaa4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
recv
inet_addr
gethostbyname
send
htons
socket
connect
closesocket
advapi32
RegSetValueExA
RegCloseKey
RegCreateKeyExA
shell32
ShellExecuteA
urlmon
URLDownloadToFileA
msvcrt
_snprintf
strcat
strlen
_except_handler3
memcpy
strstr
__p___argv
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
memset
strtok
kernel32
ExpandEnvironmentStringsA
SetErrorMode
ExitProcess
SetFileAttributesA
GetModuleHandleA
GetStartupInfoA
CopyFileA
CreateThread
lstrlenA
lstrcmpA
GetWindowsDirectoryA
WinExec
GetVersionExA
Sleep
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE