Static task
static1
Behavioral task
behavioral1
Sample
a5e2c48af38dddac4c2089e3e4717330_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a5e2c48af38dddac4c2089e3e4717330_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a5e2c48af38dddac4c2089e3e4717330_JaffaCakes118
-
Size
836KB
-
MD5
a5e2c48af38dddac4c2089e3e4717330
-
SHA1
a40b2b53796cf824682df9a20d661b293986907e
-
SHA256
f20ba7407dd6445b00982be18d22df4504f9251e368fcb051c32920697ee6aa9
-
SHA512
55d380ae4ef009caa5fe68a13c8c47700be20f1b2f15df38d44a2c0083a99430b444e58a928e1cfee22e891eb4386613af5a9db8b5c8bea6d112f238cf8d4f94
-
SSDEEP
1536:0fP9taQPCKM/Hen9osObHL2ptaQPCKMXwLQ4X+jJs:0fF4QqKlo/bHLy4QqKnQ4X+9s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a5e2c48af38dddac4c2089e3e4717330_JaffaCakes118
Files
-
a5e2c48af38dddac4c2089e3e4717330_JaffaCakes118.exe windows:0 windows x86 arch:x86
fa0b1dde3360753dcffff2cb5447ed18
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddConsoleAliasW
AssignProcessToJobObject
BaseInitAppcompatCache
BindIoCompletionCallback
BuildCommDCBAndTimeoutsW
CancelDeviceWakeupRequest
ChangeTimerQueueTimer
CommConfigDialogW
ConnectNamedPipe
CreateFileA
CreateProcessInternalA
CreateSocketHandle
CreateTimerQueue
DebugActiveProcess
DeleteCriticalSection
DeleteFileA
DeleteTimerQueue
EncodeSystemPointer
EndUpdateResourceA
EnumResourceLanguagesA
EnumResourceNamesW
EnumSystemGeoID
EnumSystemLocalesW
EnumerateLocalComputerNamesA
EraseTape
ExpandEnvironmentStringsA
ExtendVirtualBuffer
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindAtomA
FindNextFileA
FindNextFileW
FindNextVolumeW
FindVolumeMountPointClose
FlushInstructionCache
FoldStringW
GetAtomNameA
GetCPFileNameFromRegistry
GetCommState
GetCommandLineA
GetConsoleAliasExesW
GetConsoleAliasW
GetConsoleAliasesA
GetConsoleAliasesLengthW
GetConsoleAliasesW
GetConsoleCharType
GetConsoleCommandHistoryLengthW
GetConsoleInputWaitHandle
GetConsoleNlsMode
GetConsoleProcessList
GetConsoleSelectionInfo
GetConsoleTitleW
GetCurrentDirectoryA
GetDefaultSortkeySize
GetFileInformationByHandle
GetFileTime
GetFirmwareEnvironmentVariableA
GetGeoInfoA
GetHandleContext
GetLongPathNameA
GetMailslotInfo
GetModuleFileNameA
GetModuleHandleA
GetNumberOfConsoleInputEvents
GetNumberOfConsoleMouseButtons
GetPriorityClass
GetPrivateProfileSectionA
GetPrivateProfileStructW
GetProcAddress
GetProcessAffinityMask
GetProfileIntW
GetStringTypeA
GetSystemDefaultLangID
GetSystemRegistryQuota
GetSystemWow64DirectoryA
GetSystemWow64DirectoryW
GetThreadContext
GetThreadIOPendingFlag
GetThreadLocale
GetVolumeInformationA
GetVolumeNameForVolumeMountPointA
GetVolumePathNameA
GlobalAddAtomW
GlobalFree
GlobalUnlock
HeapSize
InitializeSListHead
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
IsBadWritePtr
LZDone
LoadLibraryA
LoadLibraryW
LocalAlloc
LocalFileTimeToFileTime
MapUserPhysicalPagesScatter
MoveFileW
MulDiv
OpenWaitableTimerW
Process32Next
PulseEvent
QueryMemoryResourceNotification
ReadConsoleInputW
ReadFileEx
RegisterWaitForInputIdle
ReleaseSemaphore
RemoveDirectoryW
RemoveLocalAlternateComputerNameA
ScrollConsoleScreenBufferA
SetCPGlobal
SetCommBreak
SetCommState
SetConsoleCursorInfo
SetConsoleOS2OemFormat
SetDllDirectoryA
SetEnvironmentVariableW
SetErrorMode
SetFileValidData
SetLocalPrimaryComputerNameA
SetLocaleInfoW
SetSystemTime
SetThreadLocale
SetThreadUILanguage
SetVolumeLabelA
TerminateJobObject
Thread32First
TrimVirtualBuffer
UnlockFileEx
UnregisterConsoleIME
VerSetConditionMask
VirtualFreeEx
VirtualUnlock
WaitForSingleObjectEx
WideCharToMultiByte
WriteConsoleA
WriteProcessMemory
lstrcmpiW
lstrcpyn
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ