Static task
static1
Behavioral task
behavioral1
Sample
0604e32d84c44994d97f555f9b118f28_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0604e32d84c44994d97f555f9b118f28_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0604e32d84c44994d97f555f9b118f28_JaffaCakes118
-
Size
361KB
-
MD5
0604e32d84c44994d97f555f9b118f28
-
SHA1
3a4424a035327c22f70cc95168a88168a0d95ca6
-
SHA256
dc0914a3b60d0586f32f12e4c4dd7758e707d7fb9fe7dffba562279454f23be8
-
SHA512
da2f15b9d363d263815b4f3e20d0e53b188735b60f410cc95730f7b23b9d67a581e696cabe1cf9e1baef834dbef3e6f7b107e508a2f645719e47e5fbf5fdddcc
-
SSDEEP
3072:Z6oehnAp7fJFyRZyNp1r0v25cIGb3WpZFRH4DMNpx4ieTOQTC/BwuUUjY6r:Z6bhnSJFyRupqrXb3WJ6KputTL2zUUc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0604e32d84c44994d97f555f9b118f28_JaffaCakes118
Files
-
0604e32d84c44994d97f555f9b118f28_JaffaCakes118.exe windows:5 windows x86 arch:x86
7fb3a55956a5cb8483bc3fde7cd42a6f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
ReadFile
AllocConsole
AssignProcessToJobObject
CreateJobObjectA
CreateNamedPipeA
CreateProcessA
DnsHostnameToComputerNameW
EnumLanguageGroupLocalesA
EnumSystemCodePagesA
GenerateConsoleCtrlEvent
GetAtomNameW
GetCommModemStatus
GetConsoleAliasExesLengthW
GetHandleInformation
GetLogicalDriveStringsW
GetLogicalDrives
GetNumberFormatA
GetProcessShutdownParameters
ExitProcess
GlobalWire
InterlockedCompareExchange
LocalFileTimeToFileTime
PurgeComm
QueryDosDeviceA
ReadConsoleA
ReplaceFileA
SetCalendarInfoA
SetCriticalSectionSpinCount
SetInformationJobObject
SetSystemTime
SetThreadLocale
SystemTimeToTzSpecificLocalTime
TerminateProcess
UnlockFileEx
WritePrivateProfileStructW
lstrcmpiW
lstrcpyn
lstrcpynA
GetProfileIntA
CreateFileW
user32
LoadCursorW
LoadIconA
advapi32
RegOpenKeyExW
shell32
DoEnvironmentSubstA
CommandLineToArgvW
WOWShellExecute
Shell_NotifyIconW
Shell_NotifyIconA
ShellHookProc
ShellExecuteExW
ShellAboutW
SHQueryRecycleBinW
SHQueryRecycleBinA
SHPathPrepareForWriteW
SHPathPrepareForWriteA
SHLoadNonloadedIconOverlayIdentifiers
SHLoadInProc
SHInvokePrinterCommandW
SHGetSpecialFolderPathW
SHGetSpecialFolderPathA
SHGetSpecialFolderLocation
SHGetSettings
SHGetPathFromIDListA
SHGetMalloc
SHGetIconOverlayIndexW
SHGetIconOverlayIndexA
SHGetFolderPathW
SHGetFolderPathA
SHGetDesktopFolder
SHGetDataFromIDListA
SHFileOperationW
SHFileOperationA
SHFileOperation
SHEmptyRecycleBinW
SHCreateProcessAsUserW
SHCreateDirectoryExW
SHBrowseForFolderA
SHBrowseForFolder
FindExecutableW
FindExecutableA
ExtractIconExA
ExtractIconEx
ExtractAssociatedIconExW
ExtractAssociatedIconExA
ExtractAssociatedIconA
DuplicateIcon
DragQueryFileW
DragQueryFileAorW
DragQueryFile
DragFinish
DoEnvironmentSubstW
shlwapi
StrCmpNW
StrStrW
StrStrIW
StrChrA
StrChrIA
StrChrW
StrCmpNIW
StrRChrA
StrRChrIA
StrRStrIW
StrStrIA
msvcrt
_CIlog10
_Strftime
__RTDynamicCast
__crtCompareStringA
__p__amblksiz
__p__mbcasemap
__p__osver
__p__wcmdln
__p__winmajor
__wargv
_abnormal_termination
_adj_fdivr_m16i
_chgsign
_copysign
_execv
_execvpe
_fileno
_fpieee_flt
_gmtime64
_inp
_ismbbkprint
_ismbblead
_logb
_longjmpex
_lrotr
_mbcjmstojis
_mktime64
_safe_fdivr
_seterrormode
_tell
_telli64
_ui64tow
_wcsncoll
_wexeclp
_wgetcwd
_winver
_wspawnvpe
_wstat
_wstati64
exp
fputs
ispunct
log
malloc
mblen
memcmp
memcpy
srand
strtoul
tmpnam
towupper
wcsncat
wcsrchr
wcsspn
wcstok
wscanf
Sections
.text Size: 329KB - Virtual size: 329KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata4 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ