Static task
static1
Behavioral task
behavioral1
Sample
66d0a86f5645467d01a916732f76586b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
66d0a86f5645467d01a916732f76586b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
66d0a86f5645467d01a916732f76586b_JaffaCakes118
-
Size
179KB
-
MD5
66d0a86f5645467d01a916732f76586b
-
SHA1
e3c9075e0112257b22c469cc46a6e9a4d91e7b88
-
SHA256
2cf03f4d5a3413b72edd26961934d6aa78e564d1caba9ad844dc529714e0c82a
-
SHA512
6c45bdc719e2046e8020e22f4d4d419fadd98f38dae0625f3e68af4f37eff833d0e4b1fefa82e6147025c54a8ea316a3ad8b537ec1b40b6176656f154d51a0df
-
SSDEEP
3072:QvtzPXe7ZN9ojkUjI/hXr0PY6waiXgJWrqVnmrwXLnQaMU09+YnwSY:Qdev6jk4ihXMYhaiX4W6nmrgLZMbn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 66d0a86f5645467d01a916732f76586b_JaffaCakes118
Files
-
66d0a86f5645467d01a916732f76586b_JaffaCakes118.exe windows:1 windows x86 arch:x86
a9c07f19f7d5df85c7eadd56ffa6f8e6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddConsoleAliasA
WriteConsoleInputA
EnumSystemCodePagesA
GetLogicalDriveStringsA
BuildCommDCBAndTimeoutsA
HeapFree
FindNextChangeNotification
GetModuleFileNameA
DeleteTimerQueue
CreateFileA
GetCalendarInfoA
VirtualLock
GetTempPathA
FormatMessageA
SetConsoleCursorMode
GetLastError
OpenThread
WritePrivateProfileSectionA
VirtualAllocEx
SetConsoleCtrlHandler
DeleteTimerQueueTimer
GetConsoleTitleA
GetCommandLineA
GetFullPathNameA
OpenFileMappingA
GetProcessTimes
TransmitCommChar
WriteFile
GetComPlusPackageInstallStatus
OpenMutexA
GetStdHandle
HeapDestroy
WaitForSingleObject
GetProcessWorkingSetSize
GetFileAttributesExA
GetCurrentProcessId
FindNextVolumeMountPointA
RaiseException
BeginUpdateResourceA
Process32Next
GetWriteWatch
GetConsoleCommandHistoryLengthW
WriteConsoleOutputAttribute
OpenMutexA
SetThreadPriorityBoost
FindResourceA
FindResourceExA
UnregisterWaitEx
GetFileInformationByHandle
GlobalSize
GetProcessPriorityBoost
SetHandleCount
TermsrvAppInstallMode
ReadConsoleA
GetDiskFreeSpaceA
GlobalGetAtomNameA
UnlockFile
GetCurrentProcess
FindNextFileA
_lclose
WriteProcessMemory
GetFileTime
GetModuleFileNameA
FreeEnvironmentStringsA
WaitCommEvent
UnlockFileEx
GlobalUnWire
user32
DefWindowProcA
GetClipboardSequenceNumber
GetReasonTitleFromReasonCode
LoadMenuA
DlgDirListComboBoxW
CreateIconFromResourceEx
SetWindowTextA
DrawEdge
GetAltTabInfo
CharUpperA
GetMenuState
BeginDeferWindowPos
UnlockWindowStation
MenuWindowProcA
ToAscii
InvalidateRect
SetWindowRgn
IsDialogMessage
GetKBCodePage
GetSubMenu
CheckRadioButton
DefRawInputProc
RegisterServicesProcess
EnableWindow
LoadKeyboardLayoutA
RegisterClassExA
GetWindowWord
SetWindowsHookExW
SendMessageTimeoutA
DlgDirSelectComboBoxExA
CopyIcon
SetCursor
ToAsciiEx
GetWindowModuleFileNameA
IntersectRect
PrivateExtractIconsA
LoadCursorA
CloseClipboard
GetMenuState
GetWindowTextA
LoadCursorFromFileA
SetClipboardData
EndPaint
GetUserObjectInformationA
GetClipboardOwner
ShowCaret
SetCursor
SetWindowLongA
MessageBoxTimeoutA
MenuWindowProcA
DrawTextExA
GetRawInputDeviceInfoA
SetDoubleClickTime
CharNextA
DestroyCaret
GetUserObjectInformationA
UpdateLayeredWindow
DestroyMenu
SendMessageA
GetClassLongA
SetParent
SetWindowTextA
GetDoubleClickTime
EnumDisplaySettingsExW
GetMessageExtraInfo
DestroyCaret
GetNextDlgGroupItem
RemovePropA
ShowOwnedPopups
advapi32
AddAccessAllowedObjectAce
Sections
.text Size: 145KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ