Static task
static1
Behavioral task
behavioral1
Sample
3599eb2f93ba006a6159e24908885435_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3599eb2f93ba006a6159e24908885435_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3599eb2f93ba006a6159e24908885435_JaffaCakes118
-
Size
557KB
-
MD5
3599eb2f93ba006a6159e24908885435
-
SHA1
37da19b5c883d1d8ce8cd841c008f70724c17c17
-
SHA256
b009352d257e77ff0191c2fc79df5b2295b54b839fae164d288b3c08f8d3a895
-
SHA512
499723357ae924eb3af12ad3dec25b8d51b5d9ac31c4a8bfb7ac96697aa32a7d6d36004dd1b33d1e62484f846b3131d46c861df771a151f31a65074a59bfc7a0
-
SSDEEP
12288:NqSpEqUygrEWqrE9vbJICjzeDw3e4nFTqJce5P2Ll:NqSbXfrE1bJICjze0x25P2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3599eb2f93ba006a6159e24908885435_JaffaCakes118
Files
-
3599eb2f93ba006a6159e24908885435_JaffaCakes118.exe windows:4 windows x86 arch:x86
620b7ef84680b98413c86ad662e1c217
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
RealShellExecuteExW
ExtractAssociatedIconExW
user32
InvertRect
RegisterDeviceNotificationA
RegisterClassA
AdjustWindowRectEx
DrawTextW
GetMenuStringW
CreateIcon
DestroyMenu
GetMenuDefaultItem
OpenWindowStationA
DefWindowProcA
IsCharUpperW
CharLowerA
GetGUIThreadInfo
CreateIconFromResource
DrawTextA
CreateDialogIndirectParamA
GetUserObjectSecurity
CopyAcceleratorTableW
DlgDirSelectExA
VkKeyScanW
GetWindowTextLengthA
GetClientRect
OemToCharA
RegisterClassExA
kernel32
GlobalDeleteAtom
SetFilePointer
SetConsoleCtrlHandler
HeapDestroy
InterlockedExchange
GetLocaleInfoW
SetConsoleScreenBufferSize
SetHandleCount
TlsSetValue
GetStringTypeA
FlushFileBuffers
SetSystemTime
InitializeCriticalSection
GetConsoleMode
LocalShrink
GetVersionExA
HeapCreate
GetLastError
HeapSize
GetCurrentThreadId
lstrlenA
LeaveCriticalSection
TerminateProcess
ReadFile
InterlockedIncrement
HeapFree
GetStringTypeW
CreateMutexW
OpenMutexA
ExitProcess
CloseHandle
TlsGetValue
IsValidCodePage
FillConsoleOutputCharacterW
GetSystemDefaultLCID
GetEnvironmentStrings
CompareStringW
GetModuleFileNameA
GetStartupInfoW
GetModuleFileNameW
TlsAlloc
GetProcessHeap
GetUserDefaultLCID
LCMapStringW
VirtualAlloc
IsValidLocale
GetProcAddress
WideCharToMultiByte
FindResourceExW
GetEnvironmentStringsW
GetDateFormatA
GetOEMCP
WriteConsoleW
GetConsoleCP
CreateWaitableTimerA
EnumSystemLocalesA
WriteFileEx
CreateMailslotA
ReadConsoleW
GetCurrentThread
GetLongPathNameA
RemoveDirectoryA
GetModuleHandleA
Sleep
RtlUnwind
GetCommandLineA
HeapAlloc
LoadLibraryA
GetLocaleInfoA
TlsFree
GetTimeFormatA
SetComputerNameA
SetStdHandle
CreateFileA
FreeEnvironmentStringsA
VirtualProtect
SetEnvironmentVariableA
QueryPerformanceCounter
CompareStringA
GetTickCount
WriteFile
GetFileType
GetCommandLineW
CreateMutexA
SetLastError
GetSystemTimeAsFileTime
VirtualQuery
GetStartupInfoA
LCMapStringA
GetCurrentProcess
InterlockedDecrement
GetTimeZoneInformation
EnterCriticalSection
FreeEnvironmentStringsW
MultiByteToWideChar
WriteConsoleA
GetSystemDefaultLangID
SetUnhandledExceptionFilter
CreateDirectoryExW
GetCPInfo
SetCurrentDirectoryA
GetCurrentProcessId
VirtualFree
DeleteCriticalSection
HeapReAlloc
GetStdHandle
UnhandledExceptionFilter
IsDebuggerPresent
GetConsoleOutputCP
GetACP
FreeLibrary
GetSystemDirectoryA
comctl32
InitCommonControlsEx
Sections
.text Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 360KB - Virtual size: 359KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ