Static task
static1
Behavioral task
behavioral1
Sample
18e6a64e7a831b9cb87c535fe720bf73_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
18e6a64e7a831b9cb87c535fe720bf73_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
18e6a64e7a831b9cb87c535fe720bf73_JaffaCakes118
-
Size
372KB
-
MD5
18e6a64e7a831b9cb87c535fe720bf73
-
SHA1
ed203bd0b928db992382c849073c53619be6cac5
-
SHA256
d2c6a2750e29d6a2077b24d9e02a7ba377e20f78fd100449bf93a51449c4f8ef
-
SHA512
1a68c234b7ebb2017a5f19741d8079680d51eeb436f759485082425e9864bb8be1ba7090f9a9834ef6f3c9af38935ef48140d86021dacdaa4650e49dc69479c8
-
SSDEEP
1536:PHL2ptaQPCKMP+201O+jdezoNxoEQEsJI:PHLy4QqK8odezyxotb2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 18e6a64e7a831b9cb87c535fe720bf73_JaffaCakes118
Files
-
18e6a64e7a831b9cb87c535fe720bf73_JaffaCakes118.exe windows:0 windows x86 arch:x86
bc9d73513fade031d557842dacd9c2ec
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AllocateUserPhysicalPages
AttachConsole
Beep
BeginUpdateResourceA
CallNamedPipeA
CloseHandle
CloseProfileUserMapping
ConvertFiberToThread
CopyFileA
CopyFileW
CreateDirectoryA
CreateFileA
CreateFileMappingW
CreateFileW
CreateJobSet
CreateProcessA
CreateWaitableTimerA
DeleteCriticalSection
DeleteFiber
DeviceIoControl
DosDateTimeToFileTime
EnumCalendarInfoW
EnumLanguageGroupLocalesW
EraseTape
ExitVDM
ExtendVirtualBuffer
FillConsoleOutputCharacterW
FindActCtxSectionGuid
FindCloseChangeNotification
FindFirstFileExA
FindFirstVolumeMountPointW
FindResourceExA
FreeEnvironmentStringsW
GetCPInfo
GetComputerNameExA
GetComputerNameExW
GetConsoleAliasesW
GetConsoleCommandHistoryLengthW
GetConsoleDisplayMode
GetConsoleFontInfo
GetConsoleInputWaitHandle
GetConsoleProcessList
GetCurrencyFormatW
GetDateFormatA
GetDateFormatW
GetDefaultSortkeySize
GetDevicePowerState
GetDiskFreeSpaceA
GetDiskFreeSpaceExW
GetExpandedNameA
GetFileAttributesExA
GetLargestConsoleWindowSize
GetLogicalDriveStringsA
GetLogicalDrives
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetNumaProcessorNode
GetNumberOfConsoleMouseButtons
GetOverlappedResult
GetPriorityClass
GetPrivateProfileSectionW
GetProcAddress
GetProcessIoCounters
GetProcessTimes
GetProcessVersion
GetProcessWorkingSetSize
GetProfileIntW
GetProfileSectionA
GetProfileSectionW
GetQueuedCompletionStatus
GetTapeStatus
GetTempPathA
GetUserDefaultLangID
GetVolumeInformationW
GlobalGetAtomNameW
GlobalHandle
GlobalWire
HeapReAlloc
HeapSetInformation
HeapValidate
InitializeCriticalSection
InterlockedPushEntrySList
IsDBCSLeadByte
IsValidCodePage
LZSeek
LoadLibraryA
LocalHandle
MapUserPhysicalPagesScatter
MapViewOfFile
OpenJobObjectW
OpenProcess
PurgeComm
QueryMemoryResourceNotification
ReadFile
RegisterConsoleVDM
RemoveDirectoryA
ReplaceFileA
RequestDeviceWakeup
ResumeThread
RtlMoveMemory
SetCalendarInfoA
SetComPlusPackageInstallStatus
SetCommBreak
SetCommState
SetCommTimeouts
SetComputerNameExA
SetComputerNameW
SetConsoleCommandHistoryMode
SetConsoleCursor
SetConsoleCursorInfo
SetConsoleMenuClose
SetConsoleNumberOfCommandsA
SetConsoleOutputCP
SetConsoleTextAttribute
SetConsoleWindowInfo
SetCurrentDirectoryA
SetDllDirectoryW
SetLocalTime
SetMessageWaitingIndicator
SetSystemTime
SetTapeParameters
SetTapePosition
SetThreadIdealProcessor
SetVDMCurrentDirectories
SetVolumeLabelW
SwitchToThread
TerminateProcess
Thread32First
Thread32Next
TransactNamedPipe
TryEnterCriticalSection
UnhandledExceptionFilter
VDMOperationStarted
VerLanguageNameW
VirtualQuery
VirtualQueryEx
WritePrivateProfileSectionW
WriteTapemark
_hwrite
lstrcmpi
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ