Static task
static1
Behavioral task
behavioral1
Sample
ff04a58db79aeed15203f7b763fcc9e2_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ff04a58db79aeed15203f7b763fcc9e2_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
ff04a58db79aeed15203f7b763fcc9e2_JaffaCakes118
-
Size
690KB
-
MD5
ff04a58db79aeed15203f7b763fcc9e2
-
SHA1
4697bba222fa77867fd8beba05b8cfff6aa20905
-
SHA256
e0b31fdc5f2b9cd6d0856b3568d5527b78b3cbfbd825d2309147faa6a78b76a7
-
SHA512
55dced321e0fc15ef119751e2fd7200257ce22d491488daea21f1613d4b6a094862162fbc7e06f42123248ef53c6313393ec68cb8fba642380f0e2aa9497f618
-
SSDEEP
1536:0fP9taQPCKM/Hen9osObtaQPCKMsGnZJd380zb:0fF4QqKlo/b4QqKeZJdbzb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ff04a58db79aeed15203f7b763fcc9e2_JaffaCakes118
Files
-
ff04a58db79aeed15203f7b763fcc9e2_JaffaCakes118.exe windows:0 windows x86 arch:x86
fa0b1dde3360753dcffff2cb5447ed18
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddConsoleAliasW
AssignProcessToJobObject
BaseInitAppcompatCache
BindIoCompletionCallback
BuildCommDCBAndTimeoutsW
CancelDeviceWakeupRequest
ChangeTimerQueueTimer
CommConfigDialogW
ConnectNamedPipe
CreateFileA
CreateProcessInternalA
CreateSocketHandle
CreateTimerQueue
DebugActiveProcess
DeleteCriticalSection
DeleteFileA
DeleteTimerQueue
EncodeSystemPointer
EndUpdateResourceA
EnumResourceLanguagesA
EnumResourceNamesW
EnumSystemGeoID
EnumSystemLocalesW
EnumerateLocalComputerNamesA
EraseTape
ExpandEnvironmentStringsA
ExtendVirtualBuffer
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindAtomA
FindNextFileA
FindNextFileW
FindNextVolumeW
FindVolumeMountPointClose
FlushInstructionCache
FoldStringW
GetAtomNameA
GetCPFileNameFromRegistry
GetCommState
GetCommandLineA
GetConsoleAliasExesW
GetConsoleAliasW
GetConsoleAliasesA
GetConsoleAliasesLengthW
GetConsoleAliasesW
GetConsoleCharType
GetConsoleCommandHistoryLengthW
GetConsoleInputWaitHandle
GetConsoleNlsMode
GetConsoleProcessList
GetConsoleSelectionInfo
GetConsoleTitleW
GetCurrentDirectoryA
GetDefaultSortkeySize
GetFileInformationByHandle
GetFileTime
GetFirmwareEnvironmentVariableA
GetGeoInfoA
GetHandleContext
GetLongPathNameA
GetMailslotInfo
GetModuleFileNameA
GetModuleHandleA
GetNumberOfConsoleInputEvents
GetNumberOfConsoleMouseButtons
GetPriorityClass
GetPrivateProfileSectionA
GetPrivateProfileStructW
GetProcAddress
GetProcessAffinityMask
GetProfileIntW
GetStringTypeA
GetSystemDefaultLangID
GetSystemRegistryQuota
GetSystemWow64DirectoryA
GetSystemWow64DirectoryW
GetThreadContext
GetThreadIOPendingFlag
GetThreadLocale
GetVolumeInformationA
GetVolumeNameForVolumeMountPointA
GetVolumePathNameA
GlobalAddAtomW
GlobalFree
GlobalUnlock
HeapSize
InitializeSListHead
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
IsBadWritePtr
LZDone
LoadLibraryA
LoadLibraryW
LocalAlloc
LocalFileTimeToFileTime
MapUserPhysicalPagesScatter
MoveFileW
MulDiv
OpenWaitableTimerW
Process32Next
PulseEvent
QueryMemoryResourceNotification
ReadConsoleInputW
ReadFileEx
RegisterWaitForInputIdle
ReleaseSemaphore
RemoveDirectoryW
RemoveLocalAlternateComputerNameA
ScrollConsoleScreenBufferA
SetCPGlobal
SetCommBreak
SetCommState
SetConsoleCursorInfo
SetConsoleOS2OemFormat
SetDllDirectoryA
SetEnvironmentVariableW
SetErrorMode
SetFileValidData
SetLocalPrimaryComputerNameA
SetLocaleInfoW
SetSystemTime
SetThreadLocale
SetThreadUILanguage
SetVolumeLabelA
TerminateJobObject
Thread32First
TrimVirtualBuffer
UnlockFileEx
UnregisterConsoleIME
VerSetConditionMask
VirtualFreeEx
VirtualUnlock
WaitForSingleObjectEx
WideCharToMultiByte
WriteConsoleA
WriteProcessMemory
lstrcmpiW
lstrcpyn
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ