Static task
static1
Behavioral task
behavioral1
Sample
a4e3a966f77e5f687a10a46fa6525bcd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a4e3a966f77e5f687a10a46fa6525bcd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a4e3a966f77e5f687a10a46fa6525bcd_JaffaCakes118
-
Size
292KB
-
MD5
a4e3a966f77e5f687a10a46fa6525bcd
-
SHA1
0b9ada95e40bb6dfb1252cdbde26bc419a5a59fa
-
SHA256
961312432f9b8db7548d16501a4b70baac99f39ab6ed329d4ddcb9bee520fac7
-
SHA512
9ca34f3196c1e2d42d07e01f012a791de349d7269bc229c9c0a1a98c16cc1dd1a8666e0727196f658694f08e11a089dd5f41ccde7cd3fe82d4d5f392a2c997db
-
SSDEEP
6144:MCgbw1GABqhktBhoUs0m45xkItXJP2OiEV8lXo2pPhlDi:ubwwA4+rhoUs0m4vkgXx211/pPhlW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a4e3a966f77e5f687a10a46fa6525bcd_JaffaCakes118
Files
-
a4e3a966f77e5f687a10a46fa6525bcd_JaffaCakes118.exe windows:4 windows x86 arch:x86
15dd9c0a70d760366dc90596f07aaef2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
ReadConsoleA
SetThreadPriorityBoost
GetCurrentThread
HeapCreate
GetBinaryTypeA
GetCurrentDirectoryA
EnumUILanguagesA
SetThreadContext
CallNamedPipeA
MoveFileWithProgressA
GetNumberOfConsoleFonts
GetComputerNameExA
IsBadCodePtr
GetPrivateProfileStringA
GetThreadSelectorEntry
DisconnectNamedPipe
MultiByteToWideChar
GetFileSize
GlobalGetAtomNameA
GetSystemTimeAdjustment
UnlockFile
GetCurrentProcessId
SetFilePointer
QueueUserAPC
EnumTimeFormatsA
CreateEventA
GetCommandLineA
GetLocaleInfoA
GetVolumePathNameA
WriteConsoleA
SetVDMCurrentDirectories
GetConsoleAliasesLengthA
LoadResource
GetSystemTimes
GetVDMCurrentDirectories
AddConsoleAliasA
SetVolumeMountPointA
TerminateJobObject
DeleteTimerQueue
FileTimeToDosDateTime
WriteConsoleOutputAttribute
GetPrivateProfileSectionNamesW
GetFileTime
OpenEventA
SetHandleCount
GetConsoleTitleA
WriteFileEx
GetExitCodeThread
GetUserGeoID
WriteConsoleOutputCharacterA
GetConsoleAliasA
RemoveDirectoryA
GetConsoleTitleA
UnlockFileEx
GetProcessHeap
IsBadReadPtr
SetConsoleDisplayMode
RegisterWaitForSingleObjectEx
CreateTimerQueueTimer
GetAtomNameA
SetHandleInformation
SetFileTime
LCMapStringA
GetCPInfo
CancelWaitableTimer
GetDateFormatA
HeapWalk
SetLocalTime
wininet
FtpSetCurrentDirectoryW
FtpSetCurrentDirectoryW
winmm
timeGetTime
timeGetSystemTime
Sections
.idata Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 280KB - Virtual size: 394KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ