Static task
static1
Behavioral task
behavioral1
Sample
e093f96086f2ee1db4e07e99714df4f3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e093f96086f2ee1db4e07e99714df4f3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e093f96086f2ee1db4e07e99714df4f3_JaffaCakes118
-
Size
292KB
-
MD5
e093f96086f2ee1db4e07e99714df4f3
-
SHA1
83c0c4c45bccfb17c836f60ddf0659723ceb68be
-
SHA256
6e2d6a3a8327806264d64f3f4535d446a678d5a015f37052af43c8145cf86e5d
-
SHA512
50f46902801bc35c4d568fecf4d89fa5823825df0c4288601d7cb1216ee2dfc2d283b2fc77c5c91f438b456eccb252bd0fe2d7d9b77260d31b54a09810d0efdd
-
SSDEEP
6144:qoBD6iz9BBwwPCM9MeaOsCSP26Vh9BgODLlV98io3PXlB25LtP71cYUG/tOWm+:qoGTI33765BgCLl3u3PXTyZxcYH1Oc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e093f96086f2ee1db4e07e99714df4f3_JaffaCakes118
Files
-
e093f96086f2ee1db4e07e99714df4f3_JaffaCakes118.exe windows:4 windows x86 arch:x86
3d20420e5705618d788bddb43c714e96
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadLocale
GetCurrentConsoleFont
FileTimeToSystemTime
SetUserGeoID
lstrcmpA
GetProcessWorkingSetSize
Thread32First
IsBadWritePtr
GetFullPathNameA
GetFileAttributesA
GetCurrentDirectoryA
GetCommandLineA
GetVersionExA
SetThreadLocale
GetThreadTimes
LocalCompact
WriteProcessMemory
GetStdHandle
GetThreadPriorityBoost
GetConsoleCP
SearchPathA
FlushFileBuffers
DuplicateConsoleHandle
UnlockFile
GetSystemWindowsDirectoryA
GetSystemDirectoryA
PurgeComm
LCMapStringA
ExitThread
GetStartupInfoA
WriteConsoleOutputA
SetCommMask
GetConsoleAliasExesLengthA
SetThreadPriorityBoost
GetCommandLineA
OpenEventA
FindAtomA
SetCalendarInfoA
ReadConsoleOutputAttribute
GetConsoleHardwareState
OpenSemaphoreA
EnumTimeFormatsA
WriteProfileSectionA
WriteConsoleA
GetDllDirectoryA
GetEnvironmentStringsA
GetTickCount
GetProcessHeaps
SetDefaultCommConfigA
GetThreadPriority
CreateFileMappingA
TransactNamedPipe
GetConsoleMode
GetConsoleOutputCP
GetTempPathA
UpdateResourceA
DeleteAtom
GetProcessPriorityBoost
OpenFileMappingA
GetComputerNameA
GlobalWire
GetUserGeoID
SleepEx
VerifyVersionInfoA
GetPrivateProfileSectionA
WaitNamedPipeA
lstrlenA
GetLogicalDrives
SetEnvironmentVariableA
GetFileTime
GetCPInfoExA
GetCommState
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GetConsoleTitleA
VirtualProtect
GetCurrentProcess
VirtualAllocEx
GetFileAttributesExA
SetConsoleMenuClose
GetSystemTime
FileTimeToDosDateTime
HeapValidate
GetFileSizeEx
GetPrivateProfileIntA
RemoveDirectoryA
ReadConsoleOutputAttribute
IsSystemResumeAutomatic
RegisterWaitForSingleObject
ReadFileScatter
OpenMutexA
GetVersionExA
FindFirstFileExA
ReadConsoleOutputA
ReadFileEx
GetVersionExA
CloseHandle
GetConsoleFontInfo
GetProcessId
ExitProcess
GetPrivateProfileStringA
GetFileSize
OpenEventA
GetThreadPriorityBoost
AllocConsole
GetModuleFileNameA
GetCurrentThread
_llseek
FlushFileBuffers
IsBadStringPtrA
UpdateResourceA
GetConsoleCursorInfo
GetProcessShutdownParameters
GetDevicePowerState
_lcreat
SetFilePointer
EnumResourceTypesA
IsSystemResumeAutomatic
OpenFileMappingA
GetProcessPriorityBoost
FlushViewOfFile
SetDefaultCommConfigA
GetSystemDefaultLCID
EnumSystemLocalesA
DisconnectNamedPipe
EnumSystemLanguageGroupsA
TerminateJobObject
FileTimeToLocalFileTime
GetModuleHandleA
IsBadStringPtrA
GetVersionExA
DeleteTimerQueueEx
TerminateJobObject
GetTempPathA
lstrlen
GetConsoleMode
ClearCommBreak
GetConsoleAliasExesLengthW
MoveFileExA
OpenProfileUserMapping
QueueUserAPC
GlobalMemoryStatusEx
Module32Next
GetProcessHeap
WriteConsoleOutputAttribute
SetFilePointer
SetTimeZoneInformation
EscapeCommFunction
SignalObjectAndWait
SetEvent
ResumeThread
lstrcmpiA
GetCurrentThreadId
GlobalAlloc
EndUpdateResourceA
SetConsoleCP
SetLastError
GetDiskFreeSpaceA
OpenMutexA
GetSystemWindowsDirectoryA
GetDiskFreeSpaceA
GetConsoleCommandHistoryA
GetFileAttributesExA
SetSystemTimeAdjustment
WinExec
LocalAlloc
ReadConsoleA
IsBadStringPtrA
GetCalendarInfoA
GetModuleHandleA
GetTimeFormatA
GetModuleHandleA
SetConsoleCP
BuildCommDCBAndTimeoutsW
EnumSystemLanguageGroupsA
GetConsoleCommandHistoryLengthW
CreateSemaphoreA
IsBadReadPtr
lstrcatA
user32
CharPrevExA
LoadStringA
SubtractRect
RealChildWindowFromPoint
GetWindowThreadProcessId
GetProgmanWindow
CharLowerBuffW
EnumWindows
FindWindowExA
UpdateWindow
GetWindowTextA
ChangeDisplaySettingsExA
EnumChildWindows
CheckMenuRadioItem
FrameRect
SetFocus
IsCharAlphaNumericA
EnumDisplaySettingsExA
GetQueueStatus
GetTabbedTextExtentA
SetSystemMenu
SwapMouseButton
BroadcastSystemMessageExA
TranslateMessageEx
FreeDDElParam
ChangeDisplaySettingsA
CharPrevA
UnhookWindowsHookEx
DrawStateA
RemoveMenu
CreateCursor
RegisterClassExW
BroadcastSystemMessageExW
SendDlgItemMessageA
GetAltTabInfoA
GetWindowModuleFileNameA
ReasonCodeNeedsComment
SetLayeredWindowAttributes
GetMenuItemInfoA
GetUpdateRgn
GetAncestor
GetCursor
MapVirtualKeyExW
EnumWindows
LoadKeyboardLayoutA
FlashWindow
GetDlgCtrlID
GrayStringA
RegisterClassExW
LoadIconA
CharToOemBuffW
LoadCursorFromFileA
ClipCursor
GetAltTabInfoA
RedrawWindow
OemToCharA
ReleaseCapture
GetPropA
EnumPropsA
ToUnicodeEx
SetWindowsHookExA
MessageBoxTimeoutA
CreateIconFromResourceEx
GetWindowModuleFileNameA
CharPrevExA
CharNextExA
IsCharAlphaNumericW
SetPropA
InSendMessage
CharPrevExA
RegisterClassExW
EnumPropsA
OemKeyScan
LoadMenuIndirectA
DestroyMenu
SendNotifyMessageA
SendNotifyMessageA
IsCharAlphaNumericA
SetMenuItemBitmaps
CharToOemBuffW
GetClipCursor
GetTopWindow
UnionRect
GetNextDlgTabItem
CreateDesktopA
CountClipboardFormats
CreateSystemThreads
advapi32
DuplicateToken
Sections
.itext Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 180KB - Virtual size: 500KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ