Static task
static1
Behavioral task
behavioral1
Sample
f53d23f4b10e1c9fe6f3eeeee61fefe6_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f53d23f4b10e1c9fe6f3eeeee61fefe6_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f53d23f4b10e1c9fe6f3eeeee61fefe6_JaffaCakes118
-
Size
19KB
-
MD5
f53d23f4b10e1c9fe6f3eeeee61fefe6
-
SHA1
fb98879c619624370b99df151d02e22d83996a09
-
SHA256
6302e5915da9e529949f3183d000f4b9967c1ebc321c2f84d0888a982aae15d0
-
SHA512
63915f0b631224c1fbc413efbd8e7ad3280a580a2140190b27837ed6275ef6c4c11ed55490a69daf8c567da8e3ae2f7573ad8efe28920c49614eefba228bbe36
-
SSDEEP
384:6N/oDdj1QgWPULMtayxjz2UOKjD9K1Nv35L9VjcN/oU:6NijfMIMjq41UNv3V9VjcNz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f53d23f4b10e1c9fe6f3eeeee61fefe6_JaffaCakes118
Files
-
f53d23f4b10e1c9fe6f3eeeee61fefe6_JaffaCakes118.exe windows:4 windows x86 arch:x86
1e23813a79cae2db06146cf9646364af
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MapUserPhysicalPages
GetProcessHeaps
IsBadCodePtr
GetProcessTimes
GetWriteWatch
ReadFileEx
PostQueuedCompletionStatus
WriteFileGather
PurgeComm
SetConsoleCursorPosition
GetTimeFormatA
GetLogicalDriveStringsA
RemoveDirectoryA
OpenFileMappingA
FindNextVolumeMountPointA
VirtualAlloc
IsBadStringPtrA
GetLogicalDrives
GetSystemTimeAsFileTime
SetHandleContext
FindNextVolumeW
GetThreadPriority
SetConsoleScreenBufferSize
WaitForSingleObjectEx
WriteConsoleOutputCharacterW
SetDefaultCommConfigA
SetProcessPriorityBoost
SetVolumeMountPointA
GetCommMask
CreateMutexA
WriteConsoleOutputA
GetConsoleTitleA
WriteConsoleOutputAttribute
FindNextVolumeA
OpenSemaphoreA
OpenProcess
UnregisterConsoleIME
LZCopy
GetTempPathA
ReadConsoleInputA
GetConsoleAliasesLengthA
LZCloseFile
IsSystemResumeAutomatic
SetFilePointerEx
SetVolumeLabelW
FindAtomA
SetVolumeLabelA
FindResourceExW
GetDllDirectoryA
SetConsoleMaximumWindowSize
GetThreadPriorityBoost
DeleteTimerQueue
FlushConsoleInputBuffer
SetLocaleInfoA
GetProfileSectionA
GetConsoleCommandHistoryLengthA
PulseEvent
LocalSize
ReadConsoleOutputA
GetProcessHeaps
GetComPlusPackageInstallStatus
OpenJobObjectA
GetUserDefaultLCID
LockFile
EndUpdateResourceA
OpenMutexA
SystemTimeToFileTime
IsValidCodePage
LocalLock
TransmitCommChar
CompareStringA
GetConsoleCP
GetUserDefaultUILanguage
lstrcat
GetThreadIOPendingFlag
GetConsoleAliasExesLengthA
GetNamedPipeHandleStateA
WaitForMultipleObjects
GetFullPathNameA
SetFileAttributesA
GetDiskFreeSpaceExA
CreateFileMappingW
FindFirstFileA
CreateWaitableTimerA
ReadConsoleOutputCharacterA
GetCurrentConsoleFont
GetEnvironmentVariableA
GetPriorityClass
SetCommState
BuildCommDCBA
ConnectNamedPipe
GetThreadPriorityBoost
EnumUILanguagesA
GlobalFindAtomA
GetFileTime
FreeLibrary
SetCurrentDirectoryA
QueryDosDeviceA
Thread32First
SetTimeZoneInformation
DeleteAtom
GetSystemWindowsDirectoryA
AddConsoleAliasA
_hread
ReadConsoleA
CompareFileTime
Heap32Next
dhcpcsvc
DhcpUndoRequestParams
odbc32
SQLExecute
SQLSetStmtAttr
d3d9
Direct3DCreate9
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 600B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 840B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ