Static task
static1
Behavioral task
behavioral1
Sample
449e1ac3b59c4d9e5da16f14c07c7a52_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
449e1ac3b59c4d9e5da16f14c07c7a52_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
449e1ac3b59c4d9e5da16f14c07c7a52_JaffaCakes118
-
Size
606KB
-
MD5
449e1ac3b59c4d9e5da16f14c07c7a52
-
SHA1
41a2dff3dc79df91d1e7738ec7ca76547583a9fb
-
SHA256
323d5d05d3de5a753bc6683c26e11614cff02d1bb20380c68be67c7a8e3c59c7
-
SHA512
82858004dcfc256cc9a373db38b1e2e28961019f9dad6795760a1d3499544240d3908fa2da5cefaa7962d9ff00b1c2653ab3a5645d986023b11558a457a407ff
-
SSDEEP
3072:DbHLy4QqKOehIxRt5Gi69aa+MGYJXGupeEl0AJgn72ERI4blo072Zub9uYVTeFrm:DbHEqK7aY+upl0AJgnKMf72q9uYYBg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 449e1ac3b59c4d9e5da16f14c07c7a52_JaffaCakes118
Files
-
449e1ac3b59c4d9e5da16f14c07c7a52_JaffaCakes118.exe windows:0 windows x86 arch:x86
77dc3f8ce36d268d8b3c9ea3afa74ce1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
BaseDumpAppcompatCache
BaseInitAppcompatCache
BeginUpdateResourceA
CompareFileTime
CreateEventA
CreateFiber
CreateFileA
CreateNamedPipeW
CreatePipe
CreateProcessW
CreateSemaphoreA
CreateToolhelp32Snapshot
DebugActiveProcess
DeleteAtom
DeleteFiber
EnumLanguageGroupLocalesA
EnumResourceLanguagesW
EnumSystemLocalesW
EnumTimeFormatsW
EnumUILanguagesW
EraseTape
ExitVDM
ExpandEnvironmentStringsA
FindFirstVolumeA
FindNextChangeNotification
FindNextFileA
FindNextVolumeMountPointW
FindVolumeClose
FoldStringA
FreeLibrary
FreeUserPhysicalPages
GenerateConsoleCtrlEvent
GetACP
GetAtomNameW
GetBinaryTypeW
GetComPlusPackageInstallStatus
GetCommConfig
GetCommandLineW
GetConsoleAliasExesLengthA
GetConsoleCommandHistoryA
GetConsoleCommandHistoryLengthA
GetCurrentActCtx
GetCurrentProcess
GetCurrentProcessId
GetDevicePowerState
GetDriveTypeW
GetEnvironmentStringsW
GetFileAttributesExA
GetFileAttributesExW
GetFileSizeEx
GetLogicalDrives
GetLongPathNameA
GetModuleFileNameA
GetModuleHandleA
GetNamedPipeInfo
GetNextVDMCommand
GetNumberOfConsoleMouseButtons
GetPrivateProfileIntW
GetPrivateProfileStructA
GetPrivateProfileStructW
GetProcAddress
GetProcessWorkingSetSize
GetProfileStringA
GetSystemDirectoryA
GetSystemPowerStatus
GetSystemWow64DirectoryW
GetTapePosition
GetThreadSelectorEntry
GetTickCount
GetTimeFormatA
GetTimeZoneInformation
GlobalAlloc
GlobalFindAtomA
GlobalFlags
Heap32First
HeapFree
HeapReAlloc
InitializeSListHead
InvalidateConsoleDIBits
IsBadWritePtr
IsDebuggerPresent
LoadLibraryA
LocalFileTimeToFileTime
LocalFree
LocalReAlloc
LockResource
MoveFileExA
MoveFileWithProgressA
MultiByteToWideChar
NlsConvertIntegerToString
OpenFileMappingA
PeekConsoleInputW
PrivMoveFileIdentityW
ProcessIdToSessionId
RaiseException
ReadConsoleOutputCharacterA
ReadFileScatter
RegisterWaitForSingleObjectEx
RegisterWowBaseHandlers
RegisterWowExec
ReleaseActCtx
RestoreLastError
RtlMoveMemory
RtlZeroMemory
SearchPathA
SearchPathW
SetCommMask
SetCommState
SetComputerNameExA
SetComputerNameExW
SetConsoleIcon
SetConsoleLocalEUDC
SetConsoleMaximumWindowSize
SetConsoleNlsMode
SetCriticalSectionSpinCount
SetEvent
SetFilePointerEx
SetFileShortNameW
SetFirmwareEnvironmentVariableA
SetFirmwareEnvironmentVariableW
SetLocalPrimaryComputerNameA
SetMessageWaitingIndicator
SetProcessWorkingSetSize
SetSystemTime
SetSystemTimeAdjustment
SetThreadAffinityMask
SetThreadLocale
SetThreadUILanguage
SignalObjectAndWait
TerminateThread
UTUnRegister
VerifyVersionInfoA
VirtualFree
WaitCommEvent
WaitForSingleObject
WriteConsoleInputA
WriteConsoleOutputAttribute
WritePrivateProfileSectionW
_lclose
lstrcatW
lstrcpyn
lstrlen
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ