Static task
static1
Behavioral task
behavioral1
Sample
463d1cccbcf0f8f64aec7a13353eca99_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
463d1cccbcf0f8f64aec7a13353eca99_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
463d1cccbcf0f8f64aec7a13353eca99_JaffaCakes118
-
Size
288KB
-
MD5
463d1cccbcf0f8f64aec7a13353eca99
-
SHA1
e486f72a71acc4d3ba678dcea78b7c27910b9faa
-
SHA256
f40aa5633b6177e92d7c3899a42e497da2d00c076ebc12eb594b9e44314a4955
-
SHA512
a618fef96fcb121cb2b8bbbd7f9f8cf93b44cd0149f17dad42e02be71ae85950907143894f39fd0b4346636ed79d05b62aaf26220b8c9c960fdb366df3510681
-
SSDEEP
6144:NgUB0SCOu8TuCj7a8itceXnLBbeYGhWW/Oj1uxDYGN4c1nk4:Ng60SCOuoHibReYMbwJGSc9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 463d1cccbcf0f8f64aec7a13353eca99_JaffaCakes118
Files
-
463d1cccbcf0f8f64aec7a13353eca99_JaffaCakes118.exe windows:4 windows x86 arch:x86
ecfb6d2b40b563db82100bc3a8a64ba1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_iob
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
sprintf
isdigit
calloc
printf
perror
_errno
strerror
fflush
sscanf
wcstombs
mbstowcs
wcscpy
memchr
_except_handler3
fprintf
__CxxFrameHandler
strcat
toupper
fputc
wcscat
strtok
_ftol
rand
__p__commode
ftell
malloc
free
exit
strncmp
_memccpy
_stricmp
atof
strchr
strncat
memcmp
system
atoi
strcpy
fgets
strcmp
memmove
memcpy
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
_CxxThrowException
??0exception@@QAE@ABV0@@Z
_vsnprintf
strlen
strncpy
fopen
fclose
fseek
fread
memset
strstr
??2@YAPAXI@Z
_purecall
??3@YAXPAX@Z
__p__fmode
fwrite
__set_app_type
srand
_controlfp
_strdup
msvcp60
?_Xran@std@@YAXXZ
?_Xlen@std@@YAXXZ
kernel32
GetTempPathA
GetStartupInfoA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
TransactNamedPipe
GetCurrentThread
GetCurrentProcess
CreateEventA
MultiByteToWideChar
GetLastError
CopyFileA
GetModuleFileNameA
OpenProcess
GetModuleHandleA
CreateThread
TerminateThread
FreeConsole
AllocConsole
GetStdHandle
WriteFile
CreateNamedPipeA
WaitNamedPipeA
CreateFileA
TerminateProcess
CloseHandle
ReadFile
GlobalMemoryStatus
GetVersionExA
GetComputerNameA
ExpandEnvironmentStringsA
CreateProcessA
GetSystemDirectoryA
ExitProcess
DeleteFileA
LoadLibraryA
GetProcAddress
FreeLibrary
Sleep
GetTickCount
user32
ExitWindowsEx
wsprintfA
advapi32
StartServiceA
RegQueryInfoKeyA
RegEnumKeyExA
DeleteService
ControlService
EnumServicesStatusA
RegQueryValueExA
OpenThreadToken
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegCloseKey
OpenServiceA
OpenSCManagerA
CreateServiceA
CloseServiceHandle
ChangeServiceConfig2A
RegCreateKeyExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetUserNameA
RegOpenKeyExA
RegSetValueExA
RegDeleteValueA
shell32
ShellExecuteA
ws2_32
getsockopt
recvfrom
getservbyname
ntohl
WSASocketA
setsockopt
sendto
gethostname
WSAIoctl
ntohs
gethostbyaddr
inet_ntoa
WSAStartup
htonl
inet_addr
gethostbyname
ioctlsocket
getpeername
getsockname
send
recv
__WSAFDIsSet
accept
bind
listen
closesocket
socket
htons
connect
WSAGetLastError
select
shutdown
WSACleanup
netapi32
NetUseDel
NetApiBufferFree
NetShareEnum
NetUserEnum
NetScheduleJobAdd
NetRemoteTOD
NetUseAdd
mpr
WNetAddConnection2W
WNetCancelConnection2A
WNetAddConnection2A
WNetCancelConnection2W
psapi
EnumProcesses
GetModuleBaseNameA
EnumProcessModules
dnsapi
DnsQuery_A
odbc32
ord31
ord11
ord9
ord75
ord41
ord24
Sections
.text Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mjwgptw Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE