Static task
static1
Behavioral task
behavioral1
Sample
afd075cbe04f020de2e1cbaf00fb368e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
afd075cbe04f020de2e1cbaf00fb368e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
afd075cbe04f020de2e1cbaf00fb368e_JaffaCakes118
-
Size
191KB
-
MD5
afd075cbe04f020de2e1cbaf00fb368e
-
SHA1
f75a292b83b897cc19158a7ffd150af72a0b15fc
-
SHA256
f8fe80c152f558ee24299739cb884bf280ebd93b8abf814cfc70a5fac2d11a3d
-
SHA512
c19b8967ce74e9a731ecea6dd54e172bd73f3490512facefd58cbb1c2c75b3715614122788d8547c8bf79469ce8b72f5d6380167ca4c8fd1b8f99c8ff4b39a4e
-
SSDEEP
768:Oplf7hVidReQrUrVAXDNybn3qDzAcV0YefPNtam9LIcZMCBlU5IL9/lEYXsS:6RmyQr2VAXDNuqfRmfPdWcZMU269/lE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource afd075cbe04f020de2e1cbaf00fb368e_JaffaCakes118
Files
-
afd075cbe04f020de2e1cbaf00fb368e_JaffaCakes118.exe windows:0 windows x86 arch:x86
32064af356f58b6d2ecf71f177b4d4a7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddLocalAlternateComputerNameA
AddLocalAlternateComputerNameW
BaseCleanupAppcompatCacheSupport
BasepCheckWinSaferRestrictions
BeginUpdateResourceW
CheckNameLegalDOS8Dot3W
ConnectNamedPipe
CopyFileExW
CreateDirectoryExA
CreateFileA
CreateMailslotW
CreateProcessA
CreateSemaphoreA
CreateTimerQueueTimer
DebugActiveProcess
DeleteFiber
DeleteTimerQueueTimer
DisableThreadLibraryCalls
DnsHostnameToComputerNameA
EnumCalendarInfoA
EnumCalendarInfoW
EnumDateFormatsA
EnumDateFormatsExA
EnumSystemCodePagesW
EnumSystemLanguageGroupsA
EnumerateLocalComputerNamesA
EscapeCommFunction
ExpandEnvironmentStringsA
ExpungeConsoleCommandHistoryA
ExtendVirtualBuffer
FatalExit
FindFirstFileExA
FindFirstVolumeA
FindNextChangeNotification
FindNextFileW
FindNextVolumeMountPointA
FindNextVolumeW
FlushConsoleInputBuffer
FlushViewOfFile
FreeConsole
GetAtomNameW
GetCommProperties
GetConsoleAliasExesLengthA
GetConsoleAliasExesW
GetConsoleAliasW
GetConsoleCommandHistoryLengthA
GetConsoleCommandHistoryW
GetConsoleHardwareState
GetConsoleNlsMode
GetConsoleSelectionInfo
GetConsoleTitleW
GetDefaultSortkeySize
GetDiskFreeSpaceExA
GetExitCodeThread
GetFileAttributesA
GetFileAttributesExA
GetFullPathNameA
GetGeoInfoW
GetHandleContext
GetLinguistLangSize
GetLocaleInfoA
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringW
GetProcAddress
GetProfileIntW
GetStdHandle
GetSystemDirectoryA
GetSystemTime
GetSystemWindowsDirectoryA
GetTapePosition
GetThreadIOPendingFlag
GetThreadPriorityBoost
GetTimeFormatW
GetWindowsDirectoryA
GlobalDeleteAtom
GlobalFix
GlobalFree
GlobalUnWire
GlobalUnlock
HeapExtend
HeapReAlloc
HeapValidate
IsBadCodePtr
IsValidLocale
IsValidUILanguage
LZCopy
LZInit
LZOpenFileW
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalCompact
LocalFileTimeToFileTime
MapUserPhysicalPages
MoveFileWithProgressW
MulDiv
OpenWaitableTimerW
PeekConsoleInputA
PeekNamedPipe
Process32FirstW
Process32Next
QueryInformationJobObject
QueueUserWorkItem
RegisterWaitForSingleObjectEx
RemoveLocalAlternateComputerNameA
ResumeThread
RtlUnwind
SetComputerNameExW
SetConsoleCtrlHandler
SetConsoleCursorInfo
SetConsoleCursorPosition
SetConsoleFont
SetConsoleIcon
SetConsoleNumberOfCommandsW
SetErrorMode
SetFileAttributesA
SetFileAttributesW
SetLastConsoleEventActive
SetSystemTime
SetSystemTimeAdjustment
SetTapePosition
ShowConsoleCursor
Sleep
TlsFree
TlsSetValue
TransactNamedPipe
UTUnRegister
UpdateResourceA
VerLanguageNameW
VerifyVersionInfoA
VerifyVersionInfoW
VirtualLock
WaitNamedPipeA
WideCharToMultiByte
WriteConsoleInputVDMA
WriteConsoleInputVDMW
WriteFileEx
_hread
lstrcatA
lstrcmpiA
lstrcpyA
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ