Static task
static1
Behavioral task
behavioral1
Sample
438882778c102ea2b1571aab7f959919_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
438882778c102ea2b1571aab7f959919_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
438882778c102ea2b1571aab7f959919_JaffaCakes118
-
Size
136KB
-
MD5
438882778c102ea2b1571aab7f959919
-
SHA1
f019f6d98525d9dc1f0650e3136b656f0a6157df
-
SHA256
65abc0604c05bcf2e524e9f755e14b92930c88b3bb0c297ca2dc4fe5f2f39901
-
SHA512
2f7c8d2ee23a1e1802c95ef1daf00ff1042258ed2efb376f3b3a52d13414856abf39bff69d1fd215649dd943a1131d411e8e5ee01e272e51f944d292eb0fd30c
-
SSDEEP
96:rlazpgOpgVKke92k/IbyXzky9Rxa1ejOOq6h:o6zE92k/IGwy98a0W
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 438882778c102ea2b1571aab7f959919_JaffaCakes118
Files
-
438882778c102ea2b1571aab7f959919_JaffaCakes118.exe windows:0 windows x86 arch:x86
f3cefef02fcff99003a04f58eb803934
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddConsoleAliasW
AddLocalAlternateComputerNameW
AssignProcessToJobObject
BaseCleanupAppcompatCache
BaseInitAppcompatCacheSupport
BaseProcessInitPostImport
BindIoCompletionCallback
BuildCommDCBAndTimeoutsA
CancelWaitableTimer
CmdBatNotification
CompareStringW
CreateEventW
CreateFileA
CreateFileMappingA
CreateJobObjectA
CreateJobSet
CreateProcessInternalW
CreateSemaphoreW
CreateWaitableTimerA
DecodePointer
DeleteTimerQueueEx
DeviceIoControl
DuplicateConsoleHandle
EnumDateFormatsA
EnumResourceNamesW
EnumTimeFormatsA
EnumTimeFormatsW
EraseTape
EscapeCommFunction
ExitProcess
ExpungeConsoleCommandHistoryW
FileTimeToDosDateTime
FindAtomA
FlushConsoleInputBuffer
FoldStringW
FormatMessageA
FreeConsole
FreeEnvironmentStringsW
FreeUserPhysicalPages
FreeVirtualBuffer
GetACP
GetBinaryType
GetCommConfig
GetCommProperties
GetComputerNameA
GetComputerNameW
GetConsoleAliasExesA
GetConsoleCommandHistoryLengthA
GetConsoleFontSize
GetConsoleScreenBufferInfo
GetCurrencyFormatA
GetCurrentDirectoryW
GetDateFormatW
GetDiskFreeSpaceA
GetEnvironmentStringsA
GetExitCodeProcess
GetFileAttributesExW
GetFileInformationByHandle
GetLogicalDrives
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetNativeSystemInfo
GetNumberOfConsoleFonts
GetPriorityClass
GetPrivateProfileSectionNamesW
GetPrivateProfileStringW
GetPrivateProfileStructA
GetProcAddress
GetProcessHeaps
GetSystemTimes
GetSystemWindowsDirectoryA
GetTempFileNameA
GetThreadSelectorEntry
GetUserDefaultLCID
GetUserGeoID
GetVersion
GetVolumeNameForVolumeMountPointW
GlobalFree
GlobalGetAtomNameW
GlobalLock
GlobalUnWire
GlobalUnfix
Heap32ListFirst
HeapCompact
HeapLock
HeapQueryInformation
HeapQueryTagW
IsBadWritePtr
IsDBCSLeadByteEx
IsProcessInJob
IsValidLanguageGroup
LoadLibraryA
LoadLibraryExA
LocalFlags
Module32FirstW
MoveFileA
OpenConsoleW
OpenSemaphoreA
Process32Next
QueryDosDeviceW
QueueUserAPC
ReadConsoleOutputAttribute
ReadConsoleOutputCharacterA
ReadConsoleOutputW
ReadFileScatter
ReadProcessMemory
RegisterWaitForSingleObjectEx
RemoveDirectoryA
RemoveDirectoryW
RemoveLocalAlternateComputerNameA
ScrollConsoleScreenBufferW
SearchPathW
SetComputerNameExA
SetConsoleInputExeNameA
SetConsoleKeyShortcuts
SetConsoleWindowInfo
SetEnvironmentVariableW
SetFileApisToOEM
SetFileAttributesA
SetHandleContext
SetProcessWorkingSetSize
SetThreadUILanguage
SetWaitableTimer
ShowConsoleCursor
SystemTimeToFileTime
UnlockFileEx
UnmapViewOfFile
VerLanguageNameW
VerifyConsoleIoHandle
WaitCommEvent
WinExec
WriteConsoleA
WriteConsoleInputVDMW
WriteFileEx
WritePrivateProfileSectionA
WritePrivateProfileStringW
WriteProfileSectionW
WriteProfileStringW
_lcreat
lstrcpynA
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ