Static task
static1
Behavioral task
behavioral1
Sample
b78061ebf2f27455b3fef72f9aa703cf_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b78061ebf2f27455b3fef72f9aa703cf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b78061ebf2f27455b3fef72f9aa703cf_JaffaCakes118
-
Size
382KB
-
MD5
b78061ebf2f27455b3fef72f9aa703cf
-
SHA1
de26afce833f136e84f0e53255937020d52d94dc
-
SHA256
d823e510cf596e3360e7ec5d97b2c8cd03cff3cac633739f5e2835ed1cca528f
-
SHA512
722c635d6dd4ccb66d5cc9863f56ef4173eec9d19e27ff7acd419625fd1d55706c2fc1201e7b020dc922eb9b7e55769e7402a1cd4227e2030d38e6ad4e191bbf
-
SSDEEP
3072:PHLy4QqKIMi8/lcgK7XaWWwm6TY+IB28rl1dc0LmvqCI+lxrvsdU:PHEqKgwlcgK7nf7mz4vqCzlxf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b78061ebf2f27455b3fef72f9aa703cf_JaffaCakes118
Files
-
b78061ebf2f27455b3fef72f9aa703cf_JaffaCakes118.exe windows:0 windows x86 arch:x86
bc9d73513fade031d557842dacd9c2ec
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AllocateUserPhysicalPages
AttachConsole
Beep
BeginUpdateResourceA
CallNamedPipeA
CloseHandle
CloseProfileUserMapping
ConvertFiberToThread
CopyFileA
CopyFileW
CreateDirectoryA
CreateFileA
CreateFileMappingW
CreateFileW
CreateJobSet
CreateProcessA
CreateWaitableTimerA
DeleteCriticalSection
DeleteFiber
DeviceIoControl
DosDateTimeToFileTime
EnumCalendarInfoW
EnumLanguageGroupLocalesW
EraseTape
ExitVDM
ExtendVirtualBuffer
FillConsoleOutputCharacterW
FindActCtxSectionGuid
FindCloseChangeNotification
FindFirstFileExA
FindFirstVolumeMountPointW
FindResourceExA
FreeEnvironmentStringsW
GetCPInfo
GetComputerNameExA
GetComputerNameExW
GetConsoleAliasesW
GetConsoleCommandHistoryLengthW
GetConsoleDisplayMode
GetConsoleFontInfo
GetConsoleInputWaitHandle
GetConsoleProcessList
GetCurrencyFormatW
GetDateFormatA
GetDateFormatW
GetDefaultSortkeySize
GetDevicePowerState
GetDiskFreeSpaceA
GetDiskFreeSpaceExW
GetExpandedNameA
GetFileAttributesExA
GetLargestConsoleWindowSize
GetLogicalDriveStringsA
GetLogicalDrives
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetNumaProcessorNode
GetNumberOfConsoleMouseButtons
GetOverlappedResult
GetPriorityClass
GetPrivateProfileSectionW
GetProcAddress
GetProcessIoCounters
GetProcessTimes
GetProcessVersion
GetProcessWorkingSetSize
GetProfileIntW
GetProfileSectionA
GetProfileSectionW
GetQueuedCompletionStatus
GetTapeStatus
GetTempPathA
GetUserDefaultLangID
GetVolumeInformationW
GlobalGetAtomNameW
GlobalHandle
GlobalWire
HeapReAlloc
HeapSetInformation
HeapValidate
InitializeCriticalSection
InterlockedPushEntrySList
IsDBCSLeadByte
IsValidCodePage
LZSeek
LoadLibraryA
LocalHandle
MapUserPhysicalPagesScatter
MapViewOfFile
OpenJobObjectW
OpenProcess
PurgeComm
QueryMemoryResourceNotification
ReadFile
RegisterConsoleVDM
RemoveDirectoryA
ReplaceFileA
RequestDeviceWakeup
ResumeThread
RtlMoveMemory
SetCalendarInfoA
SetComPlusPackageInstallStatus
SetCommBreak
SetCommState
SetCommTimeouts
SetComputerNameExA
SetComputerNameW
SetConsoleCommandHistoryMode
SetConsoleCursor
SetConsoleCursorInfo
SetConsoleMenuClose
SetConsoleNumberOfCommandsA
SetConsoleOutputCP
SetConsoleTextAttribute
SetConsoleWindowInfo
SetCurrentDirectoryA
SetDllDirectoryW
SetLocalTime
SetMessageWaitingIndicator
SetSystemTime
SetTapeParameters
SetTapePosition
SetThreadIdealProcessor
SetVDMCurrentDirectories
SetVolumeLabelW
SwitchToThread
TerminateProcess
Thread32First
Thread32Next
TransactNamedPipe
TryEnterCriticalSection
UnhandledExceptionFilter
VDMOperationStarted
VerLanguageNameW
VirtualQuery
VirtualQueryEx
WritePrivateProfileSectionW
WriteTapemark
_hwrite
lstrcmpi
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ