Static task
static1
Behavioral task
behavioral1
Sample
5f54dc8085583e792e621653925f7f59_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5f54dc8085583e792e621653925f7f59_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
5f54dc8085583e792e621653925f7f59_JaffaCakes118
-
Size
788KB
-
MD5
5f54dc8085583e792e621653925f7f59
-
SHA1
a369e4336d92717ab88081fa781d4fec721c56f8
-
SHA256
c1006ffc221ef3f524f8970a08a416e66e0c928a67d4bb4f2aae4e1156c4de32
-
SHA512
829a314d517680347986daecb6209ad0b045e70e6a665499abc166919fcb3bb23e607ac4e01faee4d94960fcaa8b79c85571cf5e1fb9ee69e52acae0603181b9
-
SSDEEP
1536:0fP9taQPCKM/Hen9osObHL2ptaQPCKMsWSEkpUr+O+TJaZXgueaWJ1:0fF4QqKlo/bHLy4QqK+Sir+zJaZX3WD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5f54dc8085583e792e621653925f7f59_JaffaCakes118
Files
-
5f54dc8085583e792e621653925f7f59_JaffaCakes118.exe windows:0 windows x86 arch:x86
fa0b1dde3360753dcffff2cb5447ed18
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddConsoleAliasW
AssignProcessToJobObject
BaseInitAppcompatCache
BindIoCompletionCallback
BuildCommDCBAndTimeoutsW
CancelDeviceWakeupRequest
ChangeTimerQueueTimer
CommConfigDialogW
ConnectNamedPipe
CreateFileA
CreateProcessInternalA
CreateSocketHandle
CreateTimerQueue
DebugActiveProcess
DeleteCriticalSection
DeleteFileA
DeleteTimerQueue
EncodeSystemPointer
EndUpdateResourceA
EnumResourceLanguagesA
EnumResourceNamesW
EnumSystemGeoID
EnumSystemLocalesW
EnumerateLocalComputerNamesA
EraseTape
ExpandEnvironmentStringsA
ExtendVirtualBuffer
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindAtomA
FindNextFileA
FindNextFileW
FindNextVolumeW
FindVolumeMountPointClose
FlushInstructionCache
FoldStringW
GetAtomNameA
GetCPFileNameFromRegistry
GetCommState
GetCommandLineA
GetConsoleAliasExesW
GetConsoleAliasW
GetConsoleAliasesA
GetConsoleAliasesLengthW
GetConsoleAliasesW
GetConsoleCharType
GetConsoleCommandHistoryLengthW
GetConsoleInputWaitHandle
GetConsoleNlsMode
GetConsoleProcessList
GetConsoleSelectionInfo
GetConsoleTitleW
GetCurrentDirectoryA
GetDefaultSortkeySize
GetFileInformationByHandle
GetFileTime
GetFirmwareEnvironmentVariableA
GetGeoInfoA
GetHandleContext
GetLongPathNameA
GetMailslotInfo
GetModuleFileNameA
GetModuleHandleA
GetNumberOfConsoleInputEvents
GetNumberOfConsoleMouseButtons
GetPriorityClass
GetPrivateProfileSectionA
GetPrivateProfileStructW
GetProcAddress
GetProcessAffinityMask
GetProfileIntW
GetStringTypeA
GetSystemDefaultLangID
GetSystemRegistryQuota
GetSystemWow64DirectoryA
GetSystemWow64DirectoryW
GetThreadContext
GetThreadIOPendingFlag
GetThreadLocale
GetVolumeInformationA
GetVolumeNameForVolumeMountPointA
GetVolumePathNameA
GlobalAddAtomW
GlobalFree
GlobalUnlock
HeapSize
InitializeSListHead
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
IsBadWritePtr
LZDone
LoadLibraryA
LoadLibraryW
LocalAlloc
LocalFileTimeToFileTime
MapUserPhysicalPagesScatter
MoveFileW
MulDiv
OpenWaitableTimerW
Process32Next
PulseEvent
QueryMemoryResourceNotification
ReadConsoleInputW
ReadFileEx
RegisterWaitForInputIdle
ReleaseSemaphore
RemoveDirectoryW
RemoveLocalAlternateComputerNameA
ScrollConsoleScreenBufferA
SetCPGlobal
SetCommBreak
SetCommState
SetConsoleCursorInfo
SetConsoleOS2OemFormat
SetDllDirectoryA
SetEnvironmentVariableW
SetErrorMode
SetFileValidData
SetLocalPrimaryComputerNameA
SetLocaleInfoW
SetSystemTime
SetThreadLocale
SetThreadUILanguage
SetVolumeLabelA
TerminateJobObject
Thread32First
TrimVirtualBuffer
UnlockFileEx
UnregisterConsoleIME
VerSetConditionMask
VirtualFreeEx
VirtualUnlock
WaitForSingleObjectEx
WideCharToMultiByte
WriteConsoleA
WriteProcessMemory
lstrcmpiW
lstrcpyn
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ