Static task
static1
Behavioral task
behavioral1
Sample
ab8f9b667f1cc234e04cf1b1f972aeb7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ab8f9b667f1cc234e04cf1b1f972aeb7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ab8f9b667f1cc234e04cf1b1f972aeb7_JaffaCakes118
-
Size
682KB
-
MD5
ab8f9b667f1cc234e04cf1b1f972aeb7
-
SHA1
011ed99fdf39358a60638123a7b44dd1cf59608b
-
SHA256
cf05deb17a3c7288c71de5cf4d8e6c2dc167e2ce36760e9607493a4ac7568238
-
SHA512
84bf356ed233ae0b99e2d1b148cf8d33002c5cb3983d12cba2aea0f89edb626991586e9184c31764444f585a12d211da60479559112f61b5835dedb264cb4bb0
-
SSDEEP
6144:yqKiZqKUG3LqLl77dPUD63gEZp5kmxHpU:ygv07JNg4PRpU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab8f9b667f1cc234e04cf1b1f972aeb7_JaffaCakes118
Files
-
ab8f9b667f1cc234e04cf1b1f972aeb7_JaffaCakes118.exe windows:0 windows x86 arch:x86
fa0b1dde3360753dcffff2cb5447ed18
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddConsoleAliasW
AssignProcessToJobObject
BaseInitAppcompatCache
BindIoCompletionCallback
BuildCommDCBAndTimeoutsW
CancelDeviceWakeupRequest
ChangeTimerQueueTimer
CommConfigDialogW
ConnectNamedPipe
CreateFileA
CreateProcessInternalA
CreateSocketHandle
CreateTimerQueue
DebugActiveProcess
DeleteCriticalSection
DeleteFileA
DeleteTimerQueue
EncodeSystemPointer
EndUpdateResourceA
EnumResourceLanguagesA
EnumResourceNamesW
EnumSystemGeoID
EnumSystemLocalesW
EnumerateLocalComputerNamesA
EraseTape
ExpandEnvironmentStringsA
ExtendVirtualBuffer
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindAtomA
FindNextFileA
FindNextFileW
FindNextVolumeW
FindVolumeMountPointClose
FlushInstructionCache
FoldStringW
GetAtomNameA
GetCPFileNameFromRegistry
GetCommState
GetCommandLineA
GetConsoleAliasExesW
GetConsoleAliasW
GetConsoleAliasesA
GetConsoleAliasesLengthW
GetConsoleAliasesW
GetConsoleCharType
GetConsoleCommandHistoryLengthW
GetConsoleInputWaitHandle
GetConsoleNlsMode
GetConsoleProcessList
GetConsoleSelectionInfo
GetConsoleTitleW
GetCurrentDirectoryA
GetDefaultSortkeySize
GetFileInformationByHandle
GetFileTime
GetFirmwareEnvironmentVariableA
GetGeoInfoA
GetHandleContext
GetLongPathNameA
GetMailslotInfo
GetModuleFileNameA
GetModuleHandleA
GetNumberOfConsoleInputEvents
GetNumberOfConsoleMouseButtons
GetPriorityClass
GetPrivateProfileSectionA
GetPrivateProfileStructW
GetProcAddress
GetProcessAffinityMask
GetProfileIntW
GetStringTypeA
GetSystemDefaultLangID
GetSystemRegistryQuota
GetSystemWow64DirectoryA
GetSystemWow64DirectoryW
GetThreadContext
GetThreadIOPendingFlag
GetThreadLocale
GetVolumeInformationA
GetVolumeNameForVolumeMountPointA
GetVolumePathNameA
GlobalAddAtomW
GlobalFree
GlobalUnlock
HeapSize
InitializeSListHead
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
IsBadWritePtr
LZDone
LoadLibraryA
LoadLibraryW
LocalAlloc
LocalFileTimeToFileTime
MapUserPhysicalPagesScatter
MoveFileW
MulDiv
OpenWaitableTimerW
Process32Next
PulseEvent
QueryMemoryResourceNotification
ReadConsoleInputW
ReadFileEx
RegisterWaitForInputIdle
ReleaseSemaphore
RemoveDirectoryW
RemoveLocalAlternateComputerNameA
ScrollConsoleScreenBufferA
SetCPGlobal
SetCommBreak
SetCommState
SetConsoleCursorInfo
SetConsoleOS2OemFormat
SetDllDirectoryA
SetEnvironmentVariableW
SetErrorMode
SetFileValidData
SetLocalPrimaryComputerNameA
SetLocaleInfoW
SetSystemTime
SetThreadLocale
SetThreadUILanguage
SetVolumeLabelA
TerminateJobObject
Thread32First
TrimVirtualBuffer
UnlockFileEx
UnregisterConsoleIME
VerSetConditionMask
VirtualFreeEx
VirtualUnlock
WaitForSingleObjectEx
WideCharToMultiByte
WriteConsoleA
WriteProcessMemory
lstrcmpiW
lstrcpyn
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ