Static task
static1
Behavioral task
behavioral1
Sample
4340405a9be8432ea4222e4b502e9c1a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4340405a9be8432ea4222e4b502e9c1a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4340405a9be8432ea4222e4b502e9c1a_JaffaCakes118
-
Size
272KB
-
MD5
4340405a9be8432ea4222e4b502e9c1a
-
SHA1
264e494aebffc19b0226de78989ea17a4bdf4a74
-
SHA256
1b7bbbedc6305236427a94f5864f85b2b4b9ed202df3551656dc4ff8a56d334b
-
SHA512
1444817a48dc330148552293dca476bfd50a0b5ba6b3ee7d79567317f5f0432b28e54f7f688c929d273e6fbf5332b786a16d3836dd02ec8b9bcc67c9263cc5e3
-
SSDEEP
192:tXs3sKLCin7dc0y1fkdgkpdAxGO0nD3jO/X1KAlmfkIfOzbm:tXsLeinxw1fSpLO0TjOP1Kibm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4340405a9be8432ea4222e4b502e9c1a_JaffaCakes118
Files
-
4340405a9be8432ea4222e4b502e9c1a_JaffaCakes118.exe windows:0 windows x86 arch:x86
e5668be6927e1b1739ec809174027bee
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddAtomA
AttachConsole
BackupRead
BaseDumpAppcompatCache
BaseQueryModuleData
BeginUpdateResourceW
BindIoCompletionCallback
CancelWaitableTimer
CheckNameLegalDOS8Dot3W
CloseProfileUserMapping
CreateFileA
CreateFileMappingA
CreateHardLinkW
CreateMailslotA
CreateMemoryResourceNotification
CreateRemoteThread
CreateTimerQueueTimer
CreateWaitableTimerA
DebugActiveProcess
DebugActiveProcessStop
DebugSetProcessKillOnExit
DecodeSystemPointer
DeleteAtom
DeleteFileA
EnumCalendarInfoA
EnumCalendarInfoExW
EnumSystemLocalesW
EnumTimeFormatsA
EnumerateLocalComputerNamesA
EraseTape
FillConsoleOutputCharacterA
FindActCtxSectionGuid
FindActCtxSectionStringA
FindFirstFileExW
FindFirstFileW
FindVolumeClose
FlushConsoleInputBuffer
FlushViewOfFile
FoldStringW
FreeVirtualBuffer
GetAtomNameA
GetBinaryTypeA
GetCalendarInfoA
GetComputerNameExW
GetConsoleAliasExesW
GetConsoleAliasesW
GetConsoleCommandHistoryLengthA
GetConsoleDisplayMode
GetConsoleInputWaitHandle
GetConsoleNlsMode
GetCurrencyFormatA
GetCurrentDirectoryA
GetCurrentProcessId
GetDefaultSortkeySize
GetDevicePowerState
GetEnvironmentVariableW
GetFileInformationByHandle
GetFileType
GetGeoInfoA
GetLocaleInfoA
GetLocaleInfoW
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetNumberOfConsoleInputEvents
GetPrivateProfileSectionA
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetProcessPriorityBoost
GetProcessWorkingSetSize
GetShortPathNameA
GetStartupInfoA
GetSystemDefaultLCID
GetSystemDirectoryA
GetSystemTime
GetSystemWow64DirectoryA
GetSystemWow64DirectoryW
GetThreadLocale
GetThreadSelectorEntry
GetUserDefaultLCID
GetUserDefaultUILanguage
GetVolumeInformationW
GetVolumePathNamesForVolumeNameW
GetWindowsDirectoryW
Heap32First
HeapQueryInformation
HeapQueryTagW
InitAtomTable
InitializeCriticalSectionAndSpinCount
InterlockedIncrement
IsBadWritePtr
LCMapStringA
LCMapStringW
LoadLibraryA
LoadLibraryW
LocalSize
Module32FirstW
MulDiv
OpenEventA
OpenJobObjectW
OpenSemaphoreW
OutputDebugStringW
PeekConsoleInputA
PeekNamedPipe
PrepareTape
QueryDosDeviceW
QueryPerformanceCounter
ReadFileScatter
RegisterConsoleVDM
RegisterWaitForSingleObjectEx
ReleaseSemaphore
SetCPGlobal
SetClientTimeZoneInformation
SetCommTimeouts
SetConsoleActiveScreenBuffer
SetConsoleCursor
SetConsoleDisplayMode
SetConsoleKeyShortcuts
SetConsoleMaximumWindowSize
SetConsolePalette
SetConsoleWindowInfo
SetFileAttributesW
SetFileValidData
SetFirmwareEnvironmentVariableA
SetSystemTime
SetThreadLocale
TerminateProcess
TlsGetValue
Toolhelp32ReadProcessMemory
UnhandledExceptionFilter
ValidateLCType
WTSGetActiveConsoleSessionId
WaitForDebugEvent
WriteProcessMemory
_llseek
lstrcatA
lstrcmpi
lstrcpyW
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ