Static task
static1
Behavioral task
behavioral1
Sample
a0fae35223a983f92114d6c97fb5fc21_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a0fae35223a983f92114d6c97fb5fc21_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a0fae35223a983f92114d6c97fb5fc21_JaffaCakes118
-
Size
179KB
-
MD5
a0fae35223a983f92114d6c97fb5fc21
-
SHA1
e654f5594ecf2f80ac664d5c69289342c82437e4
-
SHA256
e6ea4c8060d78a40a626c67c62469e06256eea106be6b252a19399584a843d56
-
SHA512
5d0436c4ef901ac01a3dd96a64de6f2466d2e3668c683486d4714e70b209459eceb23966f7d1df3462320647f8a1bcc10f092ea5c7d82417351d06263459ed11
-
SSDEEP
3072:wIvEWNxwnTkx1iJTQsicuGf6F0YW+LlLxS2K7/Cz+3EMI6Mu3+cOSW:w+EWNxFx1uTQsnfFYW+Li2OCq3EMINuu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a0fae35223a983f92114d6c97fb5fc21_JaffaCakes118
Files
-
a0fae35223a983f92114d6c97fb5fc21_JaffaCakes118.exe windows:1 windows x86 arch:x86
b1d0311b8c4d0fefd7dc5ac1572e5baf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WritePrivateProfileStructA
GetDefaultCommConfigA
GetVolumeNameForVolumeMountPointA
GetCurrentProcess
GetProcessIoCounters
ResumeThread
GetSystemWindowsDirectoryA
GlobalFindAtomA
SetUserGeoID
GetBinaryTypeA
GetStdHandle
LockResource
EnumSystemCodePagesA
CopyFileExW
GetDevicePowerState
GetThreadPriority
GetSystemPowerStatus
CreateFileA
GetSystemTimeAsFileTime
GetDriveTypeA
LZSeek
DeleteTimerQueue
GetModuleFileNameA
CreateTimerQueue
WriteProcessMemory
ExitVDM
OpenMutexA
GetCompressedFileSizeA
GetConsoleCP
SetConsoleCP
ReadConsoleOutputCharacterA
GetConsoleInputExeNameA
FreeEnvironmentStringsA
IsDebuggerPresent
GetLastError
GetProcessVersion
GetPrivateProfileSectionNamesA
SetConsoleActiveScreenBuffer
GetConsoleCP
GetDiskFreeSpaceExA
Module32First
ReadConsoleInputA
FindAtomA
GetCommandLineA
GetFileAttributesA
OpenThread
IsWow64Process
GetOEMCP
lstrcpyA
GetFileAttributesExA
GetFileSize
CreateFileMappingA
SetEndOfFile
SetConsoleFont
GetPrivateProfileStructA
GetTempPathA
GetTickCount
EnumSystemLanguageGroupsA
GetCommMask
VirtualAllocEx
GetThreadLocale
GetConsoleInputWaitHandle
GetAtomNameA
HeapSize
GetVolumePathNamesForVolumeNameA
SetFileAttributesA
DebugBreak
user32
PrivateExtractIconsA
LoadMenuIndirectA
SetClassLongA
ChangeDisplaySettingsA
GetRawInputDeviceInfoA
OemToCharA
GetMenuContextHelpId
CharPrevA
DrawAnimatedRects
ChangeMenuA
CreateMenu
RealGetWindowClassA
GetMenuContextHelpId
CreateMenu
EnumThreadWindows
DefMDIChildProcA
SetMessageQueue
OemToCharBuffW
AppendMenuA
LoadIconA
CreateWindowExA
GetMessageTime
GetSystemMenu
GetWindowTextLengthA
GetLayeredWindowAttributes
ModifyMenuA
SetMenuItemBitmaps
FindWindowA
GetKeyState
ReleaseDC
GetKeyNameTextA
BuildReasonArray
CreateWindowExA
MapVirtualKeyExA
RealGetWindowClassA
SetWindowWord
AppendMenuA
CascadeWindows
OpenDesktopA
IsWindow
SetSysColorsTemp
CharUpperBuffW
GetClassNameA
RealGetWindowClassA
AppendMenuA
GetComboBoxInfo
FillRect
RegisterTasklist
CharNextA
GetTitleBarInfo
DefDlgProcA
MenuWindowProcA
CallNextHookEx
PrintWindow
GetClassWord
GrayStringA
LoadKeyboardLayoutEx
IsWindowEnabled
GetGuiResources
SetWindowsHookExA
GetMessageTime
IsMenu
GetScrollBarInfo
FreeDDElParam
ScrollDC
MessageBeep
SwitchToThisWindow
InsertMenuItemA
SetWindowPlacement
SetProcessWindowStation
advapi32
AddAccessAllowedObjectAce
Sections
.text Size: 145KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ