Static task
static1
Behavioral task
behavioral1
Sample
3aee3c13d4945370d7550805317ef504_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3aee3c13d4945370d7550805317ef504_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
3aee3c13d4945370d7550805317ef504_JaffaCakes118
-
Size
196KB
-
MD5
3aee3c13d4945370d7550805317ef504
-
SHA1
11184f35e88647ca3576633e95bf92bf7324284f
-
SHA256
8d17eefa5c85c326d5bed5c7775f6eb02684194506f5d369353fa26134437ecc
-
SHA512
7eb1a8be874229a9d2a6d02559c46375b06742c8ee5add7e0896b62f1b6ca2afc433574034b458f90f39914cee9fef0d83c98a7df132dffb58c6057076abe1ed
-
SSDEEP
1536:K6zdAF2FQZ7PvNs5HG/R7+zc2XtszHFOkim7jkqYASETI2PgbylpLLVt9GDg0Fb5:KCxFQ9FZn7im8q5Pg8pLLD9xGwWLv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3aee3c13d4945370d7550805317ef504_JaffaCakes118
Files
-
3aee3c13d4945370d7550805317ef504_JaffaCakes118.exe windows:5 windows x64 arch:x64
6f9fc69e03546c2a90d073487573d758
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
oleaut32
SysFreeString
SysReAllocStringLen
SysAllocStringLen
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
user32
MessageBoxA
CharNextW
LoadStringW
MessageBoxW
LoadStringW
GetSystemMetrics
CharUpperW
kernel32
Sleep
VirtualFree
VirtualAlloc
HeapFree
HeapAlloc
GetProcessHeap
lstrlenW
lstrcpynW
VirtualQuery
QueryPerformanceCounter
GetTickCount
GetSystemInfo
GetVersion
CompareStringW
IsValidLocale
SetThreadLocale
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
WideCharToMultiByte
MultiByteToWideChar
GetACP
LoadLibraryExW
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCommandLineW
FreeLibrary
UnhandledExceptionFilter
RtlUnwindEx
RtlUnwind
RaiseException
ExitProcess
GetCurrentThreadId
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FindFirstFileW
FindClose
WriteFile
GetStdHandle
CloseHandle
GetProcAddress
RaiseException
LoadLibraryA
GetLastError
TlsSetValue
TlsGetValue
LocalFree
LocalAlloc
GetModuleHandleW
FreeLibrary
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualQuery
SizeofResource
SetEvent
SetEnvironmentVariableW
ResetEvent
LockResource
LoadResource
IsValidLocale
GetVersionExW
GetThreadLocale
GetTempPathW
GetStdHandle
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetFileAttributesW
GetExitCodeProcess
GetDiskFreeSpaceW
GetCurrentProcessId
GetCommandLineW
GetCPInfo
FreeResource
FreeLibrary
FindResourceW
EnumSystemLocalesW
EnumCalendarInfoW
DeleteFileW
CreateProcessW
CreateFileW
CreateEventW
CloseHandle
shfolder
SHGetFolderPathW
Sections
.text Size: 157KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 36KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didata Size: 512B - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 416B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ