Static task
static1
Behavioral task
behavioral1
Sample
3444be11b3520be862b35b45fff483af_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3444be11b3520be862b35b45fff483af_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3444be11b3520be862b35b45fff483af_JaffaCakes118
-
Size
345KB
-
MD5
3444be11b3520be862b35b45fff483af
-
SHA1
be3daa8061dc6a7dd9fa9adc83b373ea8ee3649d
-
SHA256
f002f6854eef19ea06579f6e2c33063844b23cec8d28a4b40ac8e23e0464734a
-
SHA512
d9f7ca407064f15575d54954704e25d9f67673850d49283307793cd0d49c85799c650a61b3aa960048bf9edf8adefabdec516e93f9ab2b7fa006f3e9ecae95ec
-
SSDEEP
6144:9mt2BCdRBQP+q85Iy+J51DseL0bUp9pDo3/2UxQ4T75edT0uhUm7t:9mtI0Bo+q8jg5tse609W3Ogh4B02U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3444be11b3520be862b35b45fff483af_JaffaCakes118
Files
-
3444be11b3520be862b35b45fff483af_JaffaCakes118.exe windows:4 windows x86 arch:x86
18afe5ca0a3aab59f76c7439f6364a1d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AbortSystemShutdownA
RegConnectRegistryW
RegEnumKeyExA
LookupPrivilegeDisplayNameA
CryptGetDefaultProviderA
DuplicateToken
CryptCreateHash
CryptDecrypt
RegQueryValueA
CryptHashSessionKey
comctl32
ImageList_Merge
ImageList_SetBkColor
ImageList_GetFlags
ImageList_GetImageInfo
ImageList_GetBkColor
ImageList_GetImageRect
ImageList_Write
DestroyPropertySheetPage
InitCommonControlsEx
CreateToolbar
DrawStatusTextA
CreateUpDownControl
ImageList_Read
DrawStatusText
CreateStatusWindowW
gdi32
GetMapMode
GetGlyphOutlineA
GetMetaFileA
GetROP2
CreateDiscardableBitmap
CreateMetaFileA
AbortDoc
PolyTextOutW
GetCharABCWidthsFloatW
GetCurrentObject
EnumFontsW
PolyPolyline
CreateCompatibleBitmap
DescribePixelFormat
SetDIBits
GetObjectA
StartDocA
EnumICMProfilesA
wininet
InternetCheckConnectionW
FtpRemoveDirectoryA
InternetInitializeAutoProxyDll
RunOnceUrlCache
InternetAutodialHangup
HttpEndRequestA
kernel32
HeapReAlloc
GetStartupInfoW
GetStringTypeA
GetModuleFileNameA
EnterCriticalSection
FlushFileBuffers
GetModuleHandleA
GetTickCount
GetCurrentProcess
SetStdHandle
SetHandleCount
GetTimeZoneInformation
WriteFile
TlsFree
SetFilePointer
TlsGetValue
FreeEnvironmentStringsA
VirtualAlloc
GetSystemTime
VirtualFree
GetLocalTime
GetFileType
GetEnvironmentStrings
GetCommandLineA
GetCurrentProcessId
InitializeCriticalSection
HeapFree
MultiByteToWideChar
GetStartupInfoA
ExitProcess
HeapCreate
SetEnvironmentVariableA
TerminateProcess
TlsSetValue
CompareStringW
SetLastError
SetThreadAffinityMask
LoadLibraryA
VirtualQuery
GetProcAddress
GetLastError
HeapDestroy
GetSystemTimeAsFileTime
GetStdHandle
CloseHandle
OpenMutexA
GetVersion
ReadFile
InterlockedExchange
FreeEnvironmentStringsW
IsBadWritePtr
GetCurrentThread
DeleteCriticalSection
CompareStringA
HeapAlloc
GetCPInfo
LeaveCriticalSection
GetEnvironmentStringsW
WideCharToMultiByte
TlsAlloc
UnhandledExceptionFilter
RtlUnwind
LCMapStringA
InterlockedIncrement
GetModuleFileNameW
InterlockedDecrement
GetCommandLineW
GetCurrentThreadId
CreateMutexA
LCMapStringW
QueryPerformanceCounter
GetStringTypeW
user32
RegisterClassExA
DrawStateW
SetScrollRange
DefWindowProcW
GetDlgCtrlID
UnionRect
WaitForInputIdle
OemToCharA
GetMenuInfo
UnhookWindowsHook
GetDesktopWindow
MessageBoxA
DrawFocusRect
DeferWindowPos
GetKeyboardLayoutList
CreateWindowExW
ShowWindow
GetWindowTextLengthA
ArrangeIconicWindows
SetForegroundWindow
DrawIconEx
DestroyWindow
GetClassInfoExW
MapVirtualKeyW
GetMenuItemInfoA
SwitchToThisWindow
GetWindowContextHelpId
OpenDesktopA
LoadAcceleratorsA
InvertRect
RegisterClassA
CharToOemW
comdlg32
PrintDlgW
Sections
.text Size: 204KB - Virtual size: 203KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ