Static task
static1
Behavioral task
behavioral1
Sample
3b14d1b1ca847054d976a2843344ebf0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3b14d1b1ca847054d976a2843344ebf0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3b14d1b1ca847054d976a2843344ebf0_JaffaCakes118
-
Size
502KB
-
MD5
3b14d1b1ca847054d976a2843344ebf0
-
SHA1
c028b6a9efdd2caa01fe43c4284e0d37c6e20fef
-
SHA256
541219dee3e050cc3218054c84f31c4e5e1173c2a4e22ab568b69fc61801cbd8
-
SHA512
23d7f72597166d1fea06c2c44c3df94eef53822003da0fe59944e47a81a9635a422d33636a15110c03ba2a6873ad5cbbfdd4d0eeb2f9c7fb460cdeb490808595
-
SSDEEP
12288:rZsHWD2lKhQ59EqH/Vot9UiBNP8XaC+eruf6weDArTX0fjmuVn:gS2lKhs9E4Vot9UiBNUKC+euf6/AvEfl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b14d1b1ca847054d976a2843344ebf0_JaffaCakes118
Files
-
3b14d1b1ca847054d976a2843344ebf0_JaffaCakes118.exe windows:4 windows x86 arch:x86
377e0dfe559b862dc90639b6270d76b9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetClassInfoExW
DefMDIChildProcA
TranslateMessage
RegisterClassA
RegisterClassExA
GetGUIThreadInfo
UnhookWindowsHook
LookupIconIdFromDirectory
InSendMessageEx
RegisterDeviceNotificationW
DdeUninitialize
TranslateAcceleratorA
GetClipboardFormatNameW
MessageBeep
GrayStringA
gdi32
SetGraphicsMode
PolyBezier
SetWindowOrgEx
GetGraphicsMode
GetCharWidthA
SetPixel
ChoosePixelFormat
GetBitmapDimensionEx
GetEnhMetaFileA
MaskBlt
wininet
SetUrlCacheEntryGroup
HttpSendRequestExA
GetUrlCacheConfigInfoW
FtpGetFileSize
GopherCreateLocatorA
CreateUrlCacheGroup
FtpPutFileW
InternetErrorDlg
FreeUrlCacheSpaceW
shell32
SHAppBarMessage
kernel32
GetUserDefaultLCID
FillConsoleOutputCharacterA
SetEnvironmentVariableW
GetLocaleInfoA
SetConsoleScreenBufferSize
GetCurrentProcess
FreeEnvironmentStringsW
GetConsoleMode
GetModuleFileNameA
HeapAlloc
ReadFile
GetConsoleOutputCP
DeleteCriticalSection
WriteConsoleA
SetHandleCount
WaitCommEvent
TlsGetValue
CloseHandle
GetStringTypeW
GetProcessHeap
GetPrivateProfileStringW
TlsFree
LockResource
FlushFileBuffers
GetTempFileNameA
CreateFileA
GetNamedPipeInfo
QueryPerformanceCounter
GetConsoleCP
GetTickCount
GetLogicalDriveStringsA
SetStdHandle
GetCurrentThreadId
IsDebuggerPresent
CompareStringW
EnumCalendarInfoExA
CreateRemoteThread
EnumSystemLocalesA
CreateMutexA
HeapReAlloc
RtlUnwind
HeapCreate
CompareStringA
InterlockedExchange
VirtualAlloc
Sleep
InitializeCriticalSection
GetFileType
VirtualFree
EnterCriticalSection
InterlockedDecrement
GetACP
GetTimeFormatA
GetCurrentProcessId
InterlockedIncrement
ReadConsoleInputA
GetLastError
WriteFile
VirtualQuery
MultiByteToWideChar
GetModuleHandleA
TlsSetValue
LCMapStringW
LoadLibraryA
GetStringTypeA
GetVersionExA
HeapSize
FreeLibrary
GetLocaleInfoW
GetEnvironmentStrings
lstrcpyn
GetOEMCP
SetLastError
GetCPInfo
InterlockedCompareExchange
SystemTimeToFileTime
SetConsoleCP
GetStartupInfoA
TlsAlloc
WideCharToMultiByte
EnumDateFormatsW
GetStdHandle
GetCommandLineA
HeapFree
IsValidCodePage
SetUnhandledExceptionFilter
SetConsoleCtrlHandler
GetDateFormatA
GlobalAlloc
GetProcAddress
HeapDestroy
ExitProcess
SetFilePointer
FreeEnvironmentStringsA
LCMapStringA
GetEnvironmentStringsW
lstrcmp
OpenMutexA
GetSystemTimeAsFileTime
GetTimeZoneInformation
WriteConsoleW
GetCurrentThread
IsValidLocale
UnhandledExceptionFilter
TerminateProcess
VirtualLock
LeaveCriticalSection
SetEnvironmentVariableA
GetProfileSectionA
comctl32
InitCommonControlsEx
Sections
.text Size: 316KB - Virtual size: 315KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 65KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ