Static task
static1
Behavioral task
behavioral1
Sample
3b1ce788743336dc5dd352ae7b7bd588_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
3b1ce788743336dc5dd352ae7b7bd588_JaffaCakes118
-
Size
420KB
-
MD5
3b1ce788743336dc5dd352ae7b7bd588
-
SHA1
34169022a270c8d94c26e7c3c9e7b7446c987218
-
SHA256
8c2bd66fa3ddc9805b5e364bc8e434b099137aaf5cc7e799cabd179a7888c3db
-
SHA512
2ba9a35aaade59075ef1ba25c7a730d86ebb1856bd437e625b8ebf0bf41d30bc344cf174afe18a38e3a80ea0b9e55abb253b8c162dfe2162a3301d86bab063c9
-
SSDEEP
6144:QTEey77PAQXnL7maKRD0j2gqoAzQ222222222222U3XNagGZn4:quXn2aKRv/RdjG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b1ce788743336dc5dd352ae7b7bd588_JaffaCakes118
Files
-
3b1ce788743336dc5dd352ae7b7bd588_JaffaCakes118.exe windows:4 windows x86 arch:x86
940bb781c51cdeaa108ce6b0bc2994b1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetErrorMode
RtlUnwind
HeapAlloc
HeapFree
HeapReAlloc
VirtualAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
ExitThread
CreateThread
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
WritePrivateProfileStringA
GetThreadLocale
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
GetCurrentProcessId
SuspendThread
ResumeThread
SetThreadPriority
GetCurrentThread
ConvertDefaultLocale
GetModuleFileNameA
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
InterlockedDecrement
GetModuleFileNameW
FreeResource
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetVersionExA
GetModuleHandleA
GetProcAddress
GlobalFree
FormatMessageA
LocalFree
MulDiv
ExitProcess
IsBadWritePtr
CreateEventA
SetEvent
ReleaseMutex
WaitForSingleObject
CreateFileA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
FlushViewOfFile
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
WinExec
lstrlenA
CompareStringA
GetVersion
MultiByteToWideChar
InterlockedExchange
CreateMutexA
SetLastError
GetCurrentThreadId
GetCurrentProcess
GetLastError
GetEnvironmentVariableA
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
user32
GetWindowThreadProcessId
GetSysColorBrush
UnregisterClassA
GetNextDlgTabItem
EndDialog
IsWindowEnabled
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
PostMessageA
MessageBoxA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindow
EndPaint
BeginPaint
ClientToScreen
GetMenuState
GetMenuItemID
GetMenuItemCount
GetClientRect
InvalidateRect
EnableWindow
TabbedTextOutA
DrawTextA
DrawTextExA
LoadIconA
IsIconic
GetSystemMenu
AppendMenuA
DrawIcon
ShowWindow
CreateWindowExA
InSendMessage
GetSystemMetrics
LoadMenuA
GetSubMenu
DrawFocusRect
RegisterWindowMessageA
SetWindowLongA
CopyIcon
GetMessageA
TranslateMessage
ValidateRect
PostQuitMessage
DestroyMenu
GetCursorPos
WindowFromPoint
GetDesktopWindow
GetActiveWindow
DestroyWindow
CreateDialogIndirectParamA
GrayStringA
GetSysColor
CloseClipboard
OpenClipboard
SetClipboardData
EmptyClipboard
SendMessageA
IsWindow
wsprintfA
GetUserObjectInformationA
GetThreadDesktop
SetCursor
PtInRect
DestroyCursor
MessageBeep
GetMessagePos
LoadCursorA
GetParent
KillTimer
SetTimer
RedrawWindow
ReleaseDC
GetDC
ScreenToClient
GetWindowRect
InflateRect
TrackPopupMenu
gdi32
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
CreateBitmap
SelectClipRgn
DeleteObject
GetClipBox
SetTextAlign
MoveToEx
LineTo
CreatePen
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
GetCharWidthA
GetTextExtentPoint32A
GetStockObject
GetObjectA
CreateFontIndirectA
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetTextMetricsA
BitBlt
Polygon
LPtoDP
DPtoLP
GetMapMode
GetBkColor
CreateCompatibleDC
CreatePolygonRgn
CreateCompatibleBitmap
CreateFontA
CreateSolidBrush
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegSetValueExA
RegCreateKeyExA
RegEnumKeyA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueA
RegCloseKey
OpenProcessToken
GetTokenInformation
GetUserNameA
shell32
ShellExecuteA
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 188KB - Virtual size: 186KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ