Static task
static1
Behavioral task
behavioral1
Sample
94d9494069ca67d918a83c9e7fad61f8_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
94d9494069ca67d918a83c9e7fad61f8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
94d9494069ca67d918a83c9e7fad61f8_JaffaCakes118
-
Size
28KB
-
MD5
94d9494069ca67d918a83c9e7fad61f8
-
SHA1
39088bc76d93014091a95bfec348ec68a432a271
-
SHA256
07e9684cf0f58fdf34278402328f73de869e2b0d3341e01d6656ea8d63918ac2
-
SHA512
8fb6be8eb4a608ba6f05f750f15324953bcdec6c81ccb87e07d2355d4185cd460edf527fe029b82780059a0c97deb57d5fd59c841b1df92c18d74f02b46fdacc
-
SSDEEP
384:A/cEfMktb0ADn6nIohGr1G+cJINEf11e4Cp3s:Oc+B2nIoIrotMs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 94d9494069ca67d918a83c9e7fad61f8_JaffaCakes118
Files
-
94d9494069ca67d918a83c9e7fad61f8_JaffaCakes118.exe windows:5 windows x86 arch:x86
28e69a0fa7af0dd5c68669226b3bc8e9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetProcAddress
LoadLibraryA
Beep
BeginUpdateResourceA
BuildCommDCBAndTimeoutsA
CreateEventA
CreateMailslotA
CreateMutexW
CreateProcessW
CreateRemoteThread
DebugActiveProcess
DeleteCriticalSection
DeleteFileA
DnsHostnameToComputerNameW
EnumCalendarInfoExA
EnumCalendarInfoW
EnumLanguageGroupLocalesA
EnumLanguageGroupLocalesW
EnumResourceLanguagesA
EnumResourceNamesA
EnumResourceTypesA
FindFirstFileExW
FindNextVolumeA
FindNextVolumeMountPointW
FlushConsoleInputBuffer
GetBinaryType
GetCompressedFileSizeW
GetComputerNameA
GetConsoleOutputCP
GetCurrencyFormatA
GetCurrentDirectoryA
GetCurrentThread
GetNamedPipeInfo
GetPrivateProfileIntA
GetPrivateProfileSectionNamesW
GetShortPathNameW
GetStdHandle
GetSystemPowerStatus
GetTapeParameters
GetTempFileNameW
GetTempPathA
GetTimeFormatW
GetVersionExW
GetVolumeNameForVolumeMountPointA
GlobalDeleteAtom
GlobalFlags
GlobalMemoryStatusEx
GlobalReAlloc
Heap32First
HeapCompact
HeapCreate
HeapValidate
InterlockedIncrement
IsBadStringPtrW
IsBadWritePtr
IsDBCSLeadByte
LoadLibraryExW
LoadModule
LocalFlags
Module32FirstW
MoveFileA
OpenFileMappingA
OpenJobObjectW
OpenWaitableTimerW
OutputDebugStringA
QueryInformationJobObject
ReadConsoleOutputAttribute
ReleaseMutex
SetCalendarInfoA
SetCommBreak
SetConsoleTitleW
SetDefaultCommConfigA
SetLastError
SetNamedPipeHandleState
SetProcessShutdownParameters
SetTapeParameters
SetThreadContext
SetThreadExecutionState
SetThreadPriority
SetVolumeLabelA
SleepEx
SystemTimeToTzSpecificLocalTime
TlsGetValue
VerLanguageNameA
VirtualFree
VirtualQuery
WaitCommEvent
WriteConsoleOutputA
WriteFile
WritePrivateProfileStructW
WriteProcessMemory
WriteProfileSectionW
WriteProfileStringA
_hread
_lwrite
lstrcpyn
msvcrt
memset
memcpy
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
b1 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
b2 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
b3 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
b4 Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ