Static task
static1
Behavioral task
behavioral1
Sample
53fe8f0ccdfc4a20c5564dd917817299_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
53fe8f0ccdfc4a20c5564dd917817299_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
53fe8f0ccdfc4a20c5564dd917817299_JaffaCakes118
-
Size
83KB
-
MD5
53fe8f0ccdfc4a20c5564dd917817299
-
SHA1
d9cd0a8c250e405cbb0dbe362a6088facb290a30
-
SHA256
e062acc1fe368fb1448d53f2d63da07eb349fe4445e0a149cd96ae44ddeceb12
-
SHA512
e0d3febc075266a4477a29787ee62ea3d587cb3d1d9752dbbef90527780fe502e3406ea1d9ecbe7b97448da88a4efc2cec22bb60baa2aed0e774dde1d1e42c4d
-
SSDEEP
1536:atGFmTxg984Uwq9uO5vMETxrOSvYyuCowtWsUJ3t8:atQV98rvnwyuCowtrUJ3t8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 53fe8f0ccdfc4a20c5564dd917817299_JaffaCakes118
Files
-
53fe8f0ccdfc4a20c5564dd917817299_JaffaCakes118.exe windows:4 windows x86 arch:x86
0cd7626b05676729ff981dbac4a65bdf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
ChangeServiceConfig2A
CloseServiceHandle
CreateServiceA
DeleteService
OpenSCManagerA
OpenServiceA
QueryServiceStatus
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceA
StartServiceCtrlDispatcherA
kernel32
AddAtomA
CloseHandle
CreateEventA
CreateFileA
CreateSemaphoreA
CreateThread
CreateToolhelp32Snapshot
ExitProcess
FindAtomA
FindResourceA
FreeLibrary
GetAtomNameA
GetComputerNameA
GetCurrentThreadId
GetFileAttributesA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
InterlockedDecrement
InterlockedIncrement
LoadResource
LocalAlloc
LockResource
OpenProcess
Process32First
Process32Next
ReadProcessMemory
ReleaseSemaphore
SetEvent
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualProtect
VirtualQuery
WaitForSingleObject
WriteFile
lstrcmpiA
lstrcpyA
lstrlenA
msvcrt
_write
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_isctype
_onexit
_pctype
_setmode
abort
atexit
atoi
exit
free
getenv
malloc
memchr
memcmp
memcpy
memmove
rand
signal
sprintf
srand
strchr
strcmp
strcpy
strerror
strncmp
time
user32
CloseClipboard
FindWindowA
GetAsyncKeyState
GetClipboardData
GetWindowThreadProcessId
OpenClipboard
ws2_32
WSACleanup
WSAStartup
closesocket
connect
gethostbyname
htons
inet_addr
inet_ntoa
recv
send
socket
Sections
.text Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 18KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 164B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE