Static task
static1
Behavioral task
behavioral1
Sample
3c2c9429250d369051778a79d697e6fb_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3c2c9429250d369051778a79d697e6fb_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
3c2c9429250d369051778a79d697e6fb_JaffaCakes118
-
Size
227KB
-
MD5
3c2c9429250d369051778a79d697e6fb
-
SHA1
816a16500d94c08c13f8af80fdfe9af4a7924018
-
SHA256
968ee27a3367476342ba28a42708ee39d62e12b3fff33294bb4567a3785bc0e7
-
SHA512
07fc12e8320ace53fffd4c479914d3dc993f444d308e432ba94668309037831826976b002e017a2cbc4534f93a97c0f83b20cb13b446ae4abdb48883def034e8
-
SSDEEP
3072:YB4OPsbcG543oO+7nOZjEYqL4LYqIdoKZlmTK+mrcuMHgHpM:AUr5QoO+7nO2ah/KgH0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c2c9429250d369051778a79d697e6fb_JaffaCakes118
Files
-
3c2c9429250d369051778a79d697e6fb_JaffaCakes118.exe windows:5 windows x64 arch:x64
f81d05191616ceed6482e7c88f4e7151
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
psapi
GetModuleFileNameExA
shlwapi
PathFileExistsA
wininet
InternetOpenA
InternetCloseHandle
InternetCheckConnectionA
InternetReadFile
InternetOpenUrlA
kernel32
GetConsoleCP
FlushFileBuffers
GetProcessHeap
GetStringTypeW
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
OpenProcess
TerminateProcess
CreateThread
GetCurrentThread
GetProcessId
GetThreadContext
IsDebuggerPresent
ReleaseMutex
WaitForSingleObject
Sleep
WriteFile
CreateFileW
GetSystemTime
GetSystemInfo
SystemTimeToFileTime
CreateMutexA
OpenMutexW
GetModuleFileNameA
OutputDebugStringW
CreateDirectoryA
CreateFileA
SetFileAttributesA
CopyFileA
MultiByteToWideChar
GetConsoleWindow
CreateToolhelp32Snapshot
Process32First
Process32Next
FindFirstFileExA
FindClose
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetFileType
GetFileAttributesExW
CreateProcessA
GetExitCodeProcess
HeapSize
HeapReAlloc
WriteConsoleW
CloseHandle
RtlCaptureContext
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
SetEndOfFile
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
RtlUnwindEx
RtlPcToFileHeader
RaiseException
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
ReadFile
GetStdHandle
WideCharToMultiByte
GetCommandLineA
GetCommandLineW
GetACP
HeapFree
HeapAlloc
CompareStringW
LCMapStringW
user32
GetWindowTextA
GetForegroundWindow
GetWindowTextLengthA
ShowWindow
GetWindowThreadProcessId
EnumDisplayDevicesA
MessageBoxA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
shell32
ShellExecuteA
Sections
.text Size: 157KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ