Static task
static1
Behavioral task
behavioral1
Sample
c04fa10976f0fc6fd59239cb7a58bbc7_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c04fa10976f0fc6fd59239cb7a58bbc7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c04fa10976f0fc6fd59239cb7a58bbc7_JaffaCakes118
-
Size
178KB
-
MD5
c04fa10976f0fc6fd59239cb7a58bbc7
-
SHA1
f5ddbcec80c59b6fcfb865918be072a7c93f110e
-
SHA256
bb301606986ec4f110285ee78867164d7891f4cf034147b6f2fcc5f3fc26111d
-
SHA512
ceaadb471b861605f82f22975bb6d5b4479dd6396bf2b3251a76685653ec833574e81e5f03029d469ea9dda799f73f59103754a274d957d3aa9c61f6c349ccd8
-
SSDEEP
3072:L1/MAn+IWmDE3MQWbfGnRedE6nNWn//Mp2wUXqIeFPvb1A2M4OYSt:h/jn+IWmIbqfmeBEnnMpfF1FPvb1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c04fa10976f0fc6fd59239cb7a58bbc7_JaffaCakes118
Files
-
c04fa10976f0fc6fd59239cb7a58bbc7_JaffaCakes118.exe windows:1 windows x86 arch:x86
b4905b8c097cc38c4dca503b80a2aa56
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FatalExit
IsBadWritePtr
QueryPerformanceCounter
GetThreadTimes
SetProcessShutdownParameters
GlobalAlloc
LocalAlloc
PeekConsoleInputA
GetPrivateProfileSectionNamesW
GetConsoleWindow
SetUnhandledExceptionFilter
GetSystemTimeAdjustment
GetConsoleCP
GetComputerNameA
GetLocaleInfoA
RemoveDirectoryA
WriteConsoleInputA
IsProcessorFeaturePresent
GlobalAddAtomA
GetSystemDefaultLCID
OpenWaitableTimerA
HeapUnlock
VirtualAlloc
OpenSemaphoreA
ProcessIdToSessionId
VirtualUnlock
GetVolumePathNameA
IsBadCodePtr
MulDiv
ReadConsoleOutputCharacterA
SetHandleInformation
ResetEvent
GetFileSize
GetConsoleCommandHistoryA
DeleteTimerQueueTimer
GetNativeSystemInfo
OpenFileMappingA
GetLongPathNameA
SetLocalPrimaryComputerNameA
TransmitCommChar
GetWindowsDirectoryA
GetFullPathNameA
GetDriveTypeA
VirtualFree
GetDllDirectoryA
IsBadWritePtr
MultiByteToWideChar
ClearCommError
WriteConsoleOutputA
GetTempPathA
CompareStringA
GetCurrentThreadId
UnlockFile
UnlockFileEx
TerminateProcess
GlobalWire
GetTapeStatus
GetCurrentDirectoryA
OpenJobObjectA
CreateTimerQueue
GetConsoleFontInfo
GetFileType
GetNumberFormatA
GetConsoleAliasExesLengthA
GetConsoleAliasesLengthW
GetCurrentThread
GetProcessTimes
SetConsoleTitleA
ReplaceFile
ExitProcess
GetFileInformationByHandle
FindFirstChangeNotificationA
GlobalHandle
SetTapePosition
ChangeTimerQueueTimer
GetVolumePathNamesForVolumeNameA
WriteConsoleOutputA
SetDllDirectoryA
GetFileSizeEx
GetModuleFileNameA
GetProcessIoCounters
CreateDirectoryExA
GlobalSize
GetModuleHandleA
SetComputerNameA
SetConsoleWindowInfo
FindResourceExA
WriteConsoleOutputA
CreateWaitableTimerA
GetLocalTime
GetProfileIntA
IsSystemResumeAutomatic
GetVersionExA
ClearCommError
WriteFile
GetDriveTypeA
CopyFileA
GetVolumeInformationA
WriteConsoleOutputCharacterA
GetExitCodeThread
Module32First
LockResource
Module32First
GetDllDirectoryA
GetFileSize
LockResource
ReadConsoleInputA
_lwrite
GetFileAttributesExA
BuildCommDCBAndTimeoutsA
HeapCreate
CreateDirectoryExA
ReadConsoleA
GetConsoleAliasExesLengthA
GetCommState
OpenEventA
GetCommandLineA
OpenThread
IsBadWritePtr
GetDateFormatA
ReadConsoleInputA
OpenEventA
WriteConsoleOutputCharacterA
GetProcessPriorityBoost
GetConsoleAliasExesW
UnlockFileEx
IsValidCodePage
MoveFileExA
SetLastError
BeginUpdateResourceA
EnumUILanguagesA
SearchPathA
SetupComm
ntdll
RtlGetLastWin32Error
user32
DestroyWindow
advapi32
AddAccessDeniedAceEx
Sections
.text Size: 44KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 100KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ