Static task
static1
Behavioral task
behavioral1
Sample
0ec27747a0df0509034eac436dfef6b8_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0ec27747a0df0509034eac436dfef6b8_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0ec27747a0df0509034eac436dfef6b8_JaffaCakes118
-
Size
660KB
-
MD5
0ec27747a0df0509034eac436dfef6b8
-
SHA1
764f2b92614b8dadb5600ff658a5a22386963e2a
-
SHA256
c27f4beb96eedb7ea11c0a4eab7014b14241b7363f0a036534786356e140cc9c
-
SHA512
67be2fec881362f4923bee9063a11530425ffe58f77af1f81be82b70894e28f23d79e1ed2c63f4a2b1098ff9e3fda251f195e6e20ed3d5a6dc3fd19a84e1be81
-
SSDEEP
6144:VXjv0A5rcne/qXEX4KEeBSqElYt1uYuCqKFaP:HcwtX4KFgqElYt1dLoP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ec27747a0df0509034eac436dfef6b8_JaffaCakes118
Files
-
0ec27747a0df0509034eac436dfef6b8_JaffaCakes118.exe windows:0 windows x86 arch:x86
a4001059f23a5a329f26c5bce4249229
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ActivateActCtx
AddAtomA
AddAtomW
BackupWrite
BaseCheckAppcompatCache
BaseFlushAppcompatCache
BaseInitAppcompatCache
BaseProcessInitPostImport
BaseQueryModuleData
BindIoCompletionCallback
BuildCommDCBAndTimeoutsW
ContinueDebugEvent
ConvertFiberToThread
CopyFileW
CreateActCtxA
CreateDirectoryExA
CreateDirectoryExW
CreateFiberEx
CreateFileA
CreateHardLinkW
CreateNlsSecurityDescriptor
CreateProcessInternalWSecure
CreateTimerQueueTimer
CreateToolhelp32Snapshot
DebugActiveProcess
DebugBreak
DecodePointer
DefineDosDeviceW
DnsHostnameToComputerNameA
DosDateTimeToFileTime
EncodeSystemPointer
EnumTimeFormatsW
ExpandEnvironmentStringsA
FatalAppExitA
FatalExit
FillConsoleOutputCharacterA
FoldStringW
FormatMessageW
FreeConsole
GetAtomNameA
GetCPFileNameFromRegistry
GetCPInfo
GetCommState
GetCommTimeouts
GetConsoleAliasW
GetConsoleAliasesA
GetConsoleAliasesLengthA
GetConsoleCP
GetConsoleInputWaitHandle
GetConsoleWindow
GetCurrentDirectoryW
GetCurrentProcessId
GetDefaultCommConfigA
GetDefaultCommConfigW
GetDiskFreeSpaceExW
GetHandleContext
GetHandleInformation
GetModuleFileNameA
GetModuleHandleA
GetNamedPipeHandleStateW
GetNextVDMCommand
GetPrivateProfileStructA
GetPrivateProfileStructW
GetProcAddress
GetProcessIoCounters
GetProcessShutdownParameters
GetProfileIntW
GetProfileStringW
GetQueuedCompletionStatus
GetSystemDefaultLCID
GetSystemDefaultUILanguage
GetSystemTimes
GetSystemWow64DirectoryW
GetThreadContext
GetThreadTimes
GetVersionExW
GetVolumePathNameW
GetVolumePathNamesForVolumeNameW
GlobalMemoryStatusEx
Heap32First
HeapExtend
HeapLock
HeapQueryTagW
HeapSummary
InitializeCriticalSectionAndSpinCount
InterlockedExchange
InterlockedFlushSList
InterlockedIncrement
LZCloseFile
LZCopy
LZOpenFileA
LoadLibraryA
LoadLibraryW
LoadModule
LoadResource
LocalAlloc
LocalCompact
LocalLock
LockFile
MapUserPhysicalPages
MoveFileExW
MoveFileWithProgressA
MoveFileWithProgressW
NlsGetCacheUpdateCount
NlsResetProcessLocale
OpenSemaphoreW
PeekConsoleInputW
PostQueuedCompletionStatus
QueryPerformanceCounter
QueryPerformanceFrequency
QueryWin31IniFilesMappedToRegistry
ReadConsoleOutputA
RegisterConsoleOS2
RemoveLocalAlternateComputerNameA
RtlFillMemory
SetCalendarInfoA
SetComputerNameW
SetConsoleCommandHistoryMode
SetConsoleMenuClose
SetConsoleOutputCP
SetConsolePalette
SetConsoleTitleA
SetConsoleWindowInfo
SetProcessAffinityMask
SetProcessPriorityBoost
SetSystemTime
SetUnhandledExceptionFilter
SetVDMCurrentDirectories
SignalObjectAndWait
TzSpecificLocalTimeToSystemTime
ValidateLocale
VirtualAllocEx
VirtualFree
WaitForSingleObject
WaitNamedPipeW
WideCharToMultiByte
WriteFileEx
WriteProfileStringA
_lopen
lstrcpy
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ