Static task
static1
Behavioral task
behavioral1
Sample
af49698bf75d51b35596af405758eff1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
af49698bf75d51b35596af405758eff1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
af49698bf75d51b35596af405758eff1_JaffaCakes118
-
Size
212KB
-
MD5
af49698bf75d51b35596af405758eff1
-
SHA1
52f37b6ff91b42e4fdfabe54c2c53e0e73e68094
-
SHA256
a520ff3b77e1eb0631a83651b290c815fd787c7832796c50bd4d003b62a414df
-
SHA512
828eb191f0a8e72a0e1474120d56911b6061469eaf74afbc47f31b037678de4ae752ab7af97f5f5d674014a4b783917cdaa9d6dddd6e1f5b5e158de02fde49f0
-
SSDEEP
6144:1xO6IxhMrzIkZC3TUNIQ2vGmGYgsNtL7X:1g6IxGrzIWVqQ2vLGYg2L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource af49698bf75d51b35596af405758eff1_JaffaCakes118
Files
-
af49698bf75d51b35596af405758eff1_JaffaCakes118.exe windows:4 windows x86 arch:x86
14af622a674920450618a69799187da6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempFileNameA
GetCommandLineW
GetCalendarInfoA
CreateSocketHandle
HeapFree
GetCurrencyFormatA
ReadConsoleInputA
VirtualAlloc
HeapSize
FlushConsoleInputBuffer
GetBinaryTypeA
ReadConsoleOutputAttribute
HeapAlloc
WritePrivateProfileStructA
GetNamedPipeHandleStateA
GetFileSize
GetSystemTimes
FindFirstVolumeA
CreateDirectoryExA
_lopen
WaitForDebugEvent
SetFilePointer
QueryPerformanceCounter
GlobalDeleteAtom
BuildCommDCBA
CreateWaitableTimerA
IsProcessorFeaturePresent
HeapSize
IsValidLanguageGroup
IsValidCodePage
GetNumberOfConsoleFonts
GetConsoleCursorMode
SetDllDirectoryA
ws2_32
socket
Sections
.itext Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 172KB - Virtual size: 833KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ