Static task
static1
Behavioral task
behavioral1
Sample
aca8818395054d01ae08ea9813300819_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aca8818395054d01ae08ea9813300819_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aca8818395054d01ae08ea9813300819_JaffaCakes118
-
Size
364KB
-
MD5
aca8818395054d01ae08ea9813300819
-
SHA1
d5b5bf1ec16c99072db5243dafcafa23cae7cf61
-
SHA256
94b4c5282244a17d011b5bb9e1d81014507aa78a0cce655281bf07aaa343e174
-
SHA512
543353519d456fe29901cf9bfa2b2ec1d8c6bac0d5dcb24c8734e87f0cccb1c4b629650fcaf3e40ee402d9ceb5d39cbf0ae3f6a6ca2ed8eec1dd625cf03cd4c2
-
SSDEEP
6144:mHEscVYHpDgNeaXcG1kRVTZxQXwUF8c7WfLpA4seBykFgIKD3M5KMam+H3RK:5KHyeactvZObx7KzI7sp4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aca8818395054d01ae08ea9813300819_JaffaCakes118
Files
-
aca8818395054d01ae08ea9813300819_JaffaCakes118.exe windows:4 windows x86 arch:x86
f64ab1a1bde3159ac0413f9227a98c74
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstVolumeA
GetEnvironmentVariableA
WritePrivateProfileStructA
RequestDeviceWakeup
WriteFileGather
VirtualAllocEx
OpenFileMappingA
HeapDestroy
GetFileInformationByHandle
UpdateResourceA
GetVersionExA
TerminateProcess
WriteConsoleInputA
SetFirmwareEnvironmentVariableA
GetCommTimeouts
GetVersionExA
SetConsoleMenuClose
SetProcessPriorityBoost
GetFullPathNameA
FlushViewOfFile
GetSystemDirectoryA
Process32Next
SetUnhandledExceptionFilter
SetThreadPriorityBoost
SetFilePointer
GlobalFix
GetDiskFreeSpaceA
VerifyVersionInfoA
CreateDirectoryExA
EndUpdateResourceA
CopyFileA
SearchPathA
ClearCommBreak
FlushFileBuffers
ReadFile
HeapFree
DuplicateHandle
SetConsoleCP
FindFirstFileExA
HeapAlloc
WriteConsoleOutputA
GetProcessHeap
LoadLibraryExW
GlobalUnfix
GetProfileStringA
ReadConsoleA
OpenJobObjectA
GetSystemTimes
MulDiv
ReadFileEx
GetLocalTime
SetThreadIdealProcessor
WriteConsoleOutputCharacterA
GetCurrentThread
IsBadCodePtr
GetPrivateProfileSectionNamesA
EscapeCommFunction
FindNextVolumeA
SetConsoleCursor
CompareFileTime
DefineDosDeviceA
GetFileSize
WaitForSingleObject
GetDefaultCommConfigA
GetTempFileNameA
MultiByteToWideChar
SizeofResource
SetCommBreak
GetStringTypeExA
OpenSemaphoreA
PeekConsoleInputA
DeleteAtom
VirtualProtectEx
DeleteFileA
GetExitCodeThread
GetThreadContext
WriteConsoleInputA
GetTickCount
EnumResourceTypesA
GetSystemPowerStatus
GetCommandLineA
GetDriveTypeA
GetVolumePathNameA
ReadConsoleA
RemoveDirectoryA
LoadLibraryExA
IsBadHugeWritePtr
DeleteTimerQueue
PrepareTape
SetCurrentDirectoryA
TransmitCommChar
WriteConsoleOutputCharacterA
OpenWaitableTimerA
SetFileAttributesA
CreateNamedPipeA
SetConsoleCP
GetStdHandle
GetSystemWindowsDirectoryA
TermsrvAppInstallMode
HeapFree
GetTickCount
GetDllDirectoryA
IsValidCodePage
GetProcessTimes
LZOpenFileA
GetFileSizeEx
LZCopy
IsBadCodePtr
SetDefaultCommConfigA
ReplaceFileA
DebugBreak
GetCurrentProcess
BuildCommDCBAndTimeoutsA
FindFirstVolumeMountPointA
UnregisterConsoleIME
GetExitCodeThread
OpenSemaphoreA
GetThreadTimes
RemoveDirectoryA
GlobalHandle
Sleep
PulseEvent
FlushConsoleInputBuffer
GetProfileSectionA
GetFileAttributesExA
FindCloseChangeNotification
SetHandleInformation
ResetWriteWatch
HeapSize
GetBinaryType
QueryPerformanceCounter
GetCPInfoExA
GetProcessIoCounters
GetThreadPriorityBoost
LocalUnlock
ReadConsoleOutputCharacterA
WritePrivateProfileSectionA
Thread32Next
GetThreadTimes
GetExpandedNameA
GetCurrentProcess
CallNamedPipeA
IsBadStringPtrA
SetCommMask
IsBadStringPtrA
GetFileSizeEx
HeapUnlock
GetSystemWindowsDirectoryA
LockFileEx
GetProfileIntA
ConvertDefaultLocale
IsProcessorFeaturePresent
SetProcessShutdownParameters
GetWindowsDirectoryA
lstrcpyn
TransmitCommChar
Module32Next
SetFileAttributesA
GetCommandLineA
SetInformationJobObject
GetConsoleAliasA
FreeLibrary
GetCurrentConsoleFont
HeapQueryInformation
EnumSystemCodePagesA
GetLocaleInfoA
GetProcessIoCounters
FindFirstChangeNotificationA
GetNamedPipeHandleStateA
SetConsoleCursorPosition
user32
ChangeDisplaySettingsExA
DrawTextA
SetClassLongA
CharPrevExA
RemovePropA
CopyRect
MapVirtualKeyExW
EnumDisplaySettingsExA
LoadStringA
EnumWindows
BroadcastSystemMessageExA
RealGetWindowClass
GetAsyncKeyState
GetClipCursor
QuerySendMessage
DisableProcessWindowsGhosting
GetMenuBarInfo
GetCapture
ReasonCodeNeedsBugID
FlashWindow
UnregisterClassA
SetPropA
MenuWindowProcA
SetScrollRange
GetClassInfoExA
CheckMenuRadioItem
IsWinEventHookInstalled
ReplyMessage
GetScrollPos
DestroyIcon
IsWindowVisible
SetDoubleClickTime
MonitorFromRect
GetWindowTextA
SetWindowLongA
InsertMenuItemA
CreateDialogParamA
ModifyMenuA
RecordShutdownReason
CopyAcceleratorTableA
ChangeMenuA
DrawStateA
CascadeChildWindows
GetNextDlgTabItem
SetWindowStationUser
RegisterWindowMessageA
SetPropA
EnumDisplayDevicesA
SetDlgItemInt
GetRawInputDeviceList
CreatePopupMenu
SetWindowPos
CloseDesktop
CreateWindowStationW
LoadStringA
SetWindowTextA
DrawStateA
SendMessageTimeoutW
UnhookWindowsHook
ToAscii
DestroyAcceleratorTable
CreateSystemThreads
FillRect
SetDeskWallpaper
SetWindowsHookExA
TrackPopupMenuEx
GetRawInputDeviceInfoA
TabbedTextOutA
GetTaskmanWindow
SetClassWord
IsServerSideWindow
MonitorFromPoint
RegisterClassExA
SetShellWindowEx
SetDlgItemInt
GetClassInfoA
RegisterClassExA
GetMenuStringA
GetSubMenu
RegisterSystemThread
GetScrollBarInfo
OemToCharBuffW
IsCharLowerA
SetPropA
advapi32
IsValidSid
Sections
.itext Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 188KB - Virtual size: 441KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ