Static task
static1
Behavioral task
behavioral1
Sample
3ae750e25cd58316efc9c9cfa645c61e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3ae750e25cd58316efc9c9cfa645c61e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3ae750e25cd58316efc9c9cfa645c61e_JaffaCakes118
-
Size
844KB
-
MD5
3ae750e25cd58316efc9c9cfa645c61e
-
SHA1
26822266f81dda64cb5713d324ab664b914c512f
-
SHA256
a4eccebc5c3b13794bd9af984511a3c55f9ffaa6407b57aba7453cf43f418381
-
SHA512
6f33c1ed9b9faf8eaa3dac8aeea94a6ec0f844919153f75c390e044ef1cdab8a278e90087d93196960c0aad3c288562e3527e61e37c33f7883eb0aae3c645c98
-
SSDEEP
12288:wWpVjixczVDY+7k6RTcZDaLfkDIOxsQv/7CrVCrAyQqPk/zhBLXpwSTIJWlA2Oc8:5+xyVM+wuuACwqPWhBLXptlAi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ae750e25cd58316efc9c9cfa645c61e_JaffaCakes118
Files
-
3ae750e25cd58316efc9c9cfa645c61e_JaffaCakes118.exe windows:5 windows x86 arch:x86
eae53ecf6e19a63ad8aef92ad44ca049
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiW
CreateThread
GetShortPathNameW
LoadLibraryW
GetDiskFreeSpaceW
lstrcmpiA
lstrcmpW
GetExitCodeProcess
GetPrivateProfileStringW
FindClose
DeleteFileW
MulDiv
OpenProcess
GetCurrentProcess
lstrcpynA
ExitProcess
SetErrorMode
CopyFileW
LoadLibraryA
lstrcpyA
MoveFileW
lstrcpynW
GetFileSize
lstrcpyW
RemoveDirectoryW
GetVersion
WideCharToMultiByte
CreateFileW
ExpandEnvironmentStringsW
GetTickCount
ReadFile
Sleep
CreateProcessW
GetLastError
GlobalAlloc
SetCurrentDirectoryW
GetFullPathNameW
GetSystemDirectoryA
lstrcatA
VirtualProtectEx
GetVersionExW
GlobalFree
FreeLibrary
GetSystemDirectoryW
GetProcAddress
GetCommandLineW
SearchPathW
SetFileTime
GetTempPathW
CloseHandle
WritePrivateProfileStringW
GetTempFileNameW
GlobalUnlock
SetFileAttributesW
FindNextFileW
lstrcatW
GetFileAttributesW
LoadLibraryExW
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
FindFirstFileW
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
GetModuleHandleW
GetModuleHandleA
SetFilePointer
CreateDirectoryW
lstrlenA
CompareFileTime
GlobalLock
lstrlenW
WriteFile
WaitForSingleObject
GetWindowsDirectoryW
MultiByteToWideChar
user32
CreateWindowExW
ShowWindow
DrawTextW
PostQuitMessage
DefWindowProcW
EmptyClipboard
ExitWindowsEx
MessageBoxIndirectW
EnableWindow
SetClipboardData
IsWindowVisible
GetSystemMetrics
PeekMessageW
SetWindowPos
IsWindowEnabled
CallWindowProcW
EndPaint
DispatchMessageW
IsWindow
wsprintfW
ScreenToClient
CreatePopupMenu
CharPrevW
GetSysColor
GetWindowRect
CharUpperW
FillRect
SetForegroundWindow
FindWindowExW
CharNextW
TrackPopupMenu
LoadBitmapW
wsprintfA
SetWindowTextW
GetClassInfoW
SendMessageTimeoutW
SetCursor
SetClassLongW
DestroyWindow
SendMessageW
GetDlgItemTextW
SetTimer
BeginPaint
GetMessagePos
SetWindowLongW
GetDC
CharNextA
GetClientRect
GetWindowLongW
SystemParametersInfoW
LoadCursorW
OpenClipboard
CheckDlgButton
LoadImageW
InvalidateRect
AppendMenuW
GetDlgItem
GetSystemMenu
EndDialog
CreateDialogParamW
RegisterClassW
CloseClipboard
DialogBoxParamW
EnableMenuItem
SetDlgItemTextW
gdi32
DeleteObject
SetTextColor
SelectObject
CreateBrushIndirect
GetDeviceCaps
SetBkMode
CreateFontIndirectW
SetBkColor
advapi32
RegQueryValueExW
RegSetValueExW
RegEnumValueW
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyW
RegCloseKey
RegOpenKeyExW
RegDeleteValueW
shell32
SHBrowseForFolderW
ShellExecuteW
SHFileOperationW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetFileInfoW
ole32
CoCreateInstance
OleInitialize
CoTaskMemFree
OleUninitialize
comctl32
ord17
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
msvcrt
_c_exit
_exit
_XcptFilter
_cexit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_except_handler3
exit
fclose
fopen
fread
oleacc
ObjectFromLresult
esent
JetEndSession
Sections
.text Size: 474KB - Virtual size: 474KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.joke Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.poke Size: 1024B - Virtual size: 666B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.zt Size: - Virtual size: 154KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 856B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hk Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zx Size: 240KB - Virtual size: 239KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zz Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ