Static task
static1
Behavioral task
behavioral1
Sample
f3d2740c8764ef557b5c7da167c4a35d_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f3d2740c8764ef557b5c7da167c4a35d_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f3d2740c8764ef557b5c7da167c4a35d_JaffaCakes118
-
Size
536KB
-
MD5
f3d2740c8764ef557b5c7da167c4a35d
-
SHA1
49a021f36c8aaa28755656f0563789d4e85da69d
-
SHA256
97d5212e33bab62b9028306ba5f65ca515954b9dc180787a5d62454f054c4427
-
SHA512
01fffa735f75e102a5cdf488181150a5a89f65dafcbbbc40de3ac84c38316ec44e577b1cc4099c2ad3e6be62fc41b0710c0f37aab7928a68970710bf26c75c97
-
SSDEEP
6144:n1si+aWPx1M2N2KHXniBnmmqBxjdi+ht7eUDa4VBDeJmIjBHpkfCKvh+E+49vNFq:1hKKd4hTe2aOAmI9Wr9vfU8PY8EFHl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f3d2740c8764ef557b5c7da167c4a35d_JaffaCakes118
Files
-
f3d2740c8764ef557b5c7da167c4a35d_JaffaCakes118.exe windows:4 windows x86 arch:x86
4f0a8555544ef39bd20b0b37d82838d6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_DrawEx
ImageList_Duplicate
ImageList_LoadImageA
ImageList_AddIcon
_TrackMouseEvent
InitCommonControlsEx
kernel32
OpenFile
VirtualAlloc
HeapAlloc
SetEnvironmentVariableA
UnhandledExceptionFilter
GetCurrentProcess
InterlockedExchange
GetCurrentProcessId
GetTimeZoneInformation
LoadLibraryA
CreateSemaphoreA
FreeEnvironmentStringsA
InitializeCriticalSection
TlsFree
GetFileType
SetUnhandledExceptionFilter
RtlUnwind
SetFilePointer
GetLastError
GetVersionExA
GetConsoleOutputCP
GetSystemTimeAsFileTime
GetStringTypeA
GetCommandLineA
CreateFileA
LCMapStringW
TlsGetValue
HeapCreate
SetStdHandle
VirtualQuery
FindNextChangeNotification
SetLastError
MultiByteToWideChar
FreeLibrary
GetLocaleInfoW
WriteConsoleA
MoveFileExA
SetConsoleCtrlHandler
CompareStringA
GetCPInfo
GetNumberFormatA
GetEnvironmentStrings
EnumSystemLocalesA
GetConsoleCP
TlsSetValue
SetCurrentDirectoryW
CloseHandle
DeleteFileW
GetStdHandle
InterlockedDecrement
GetConsoleMode
IsValidLocale
GetStringTypeW
CompareStringW
ReleaseMutex
GetProcAddress
GetACP
VirtualLock
LCMapStringA
EnterCriticalSection
LockFileEx
OutputDebugStringW
HeapDestroy
WriteConsoleW
SetCriticalSectionSpinCount
GetUserDefaultLCID
HeapFree
TerminateProcess
GetTimeFormatA
GetModuleHandleA
ReadFile
IsValidCodePage
GetEnvironmentStringsW
GetCurrentThreadId
GetDateFormatA
GetLocaleInfoA
IsDebuggerPresent
FlushFileBuffers
QueryPerformanceCounter
WideCharToMultiByte
SetConsoleScreenBufferSize
CreateMutexA
GetPrivateProfileSectionNamesA
DeleteCriticalSection
SetEndOfFile
GetStartupInfoA
TlsAlloc
GetModuleFileNameA
GetOEMCP
SetHandleCount
GetLogicalDriveStringsW
FileTimeToDosDateTime
InterlockedIncrement
FreeEnvironmentStringsW
GetNumberFormatW
LocalHandle
WriteFile
HeapReAlloc
DeleteFileA
GetTickCount
LeaveCriticalSection
ExitProcess
Sleep
GetProcessHeap
OpenMutexA
GetVersionExW
HeapSize
GetCurrentThread
VirtualFree
GlobalAlloc
user32
RegisterClassA
DdeGetData
SetClipboardData
RegisterClassExA
DlgDirSelectExW
Sections
.text Size: 323KB - Virtual size: 323KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ