Static task
static1
Behavioral task
behavioral1
Sample
3b19b6206bf882b9c7c882cab578eb40_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3b19b6206bf882b9c7c882cab578eb40_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3b19b6206bf882b9c7c882cab578eb40_JaffaCakes118
-
Size
494KB
-
MD5
3b19b6206bf882b9c7c882cab578eb40
-
SHA1
9d7d2a928e7c645551a7d0f3c70f95930ff25f6f
-
SHA256
7bcf64992f0e601ce28957074dbb1cb87ae9f133a8a6029e7d502b8345b16b7f
-
SHA512
a734cc6e0c3d190496c3f749c7ccc10bc3911a7bc84dd0e20d532ae6ef8787b46e459cf8f5e20d308a9cf449014587463fef98782e34766c944f8ae8fb284df5
-
SSDEEP
12288:6Y4l9ElkQk3VfjiFmfQQW9hBQD0oAYz6YXU7M0NQ:6tnOlsymfQf6R/z27ME
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b19b6206bf882b9c7c882cab578eb40_JaffaCakes118
Files
-
3b19b6206bf882b9c7c882cab578eb40_JaffaCakes118.exe windows:4 windows x86 arch:x86
03a3b55734c548f61c4b594713cfdff4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
ResetDCA
EqualRgn
CreateDiscardableBitmap
CreateCompatibleDC
Polygon
CreateMetaFileA
Escape
GetWindowExtEx
EnumICMProfilesA
SetICMMode
GetClipBox
StartDocA
PlayEnhMetaFile
FillPath
GetGlyphOutlineW
DrawEscape
SetFontEnumeration
user32
GetTitleBarInfo
GetClassLongW
DdeClientTransaction
GetKeyboardLayout
RegisterClassExA
GetThreadDesktop
GetMenuItemID
GetWindowRgn
RegisterClassA
GetMessagePos
GetDesktopWindow
RemovePropA
VkKeyScanExW
CopyAcceleratorTableA
GetScrollRange
UnpackDDElParam
IsCharAlphaNumericA
SendMessageTimeoutA
SetFocus
SetDebugErrorLevel
GetComboBoxInfo
GetWindowLongW
DdeKeepStringHandle
SetProcessWindowStation
EndMenu
SetUserObjectInformationW
comctl32
InitCommonControlsEx
kernel32
CreateMutexA
TlsSetValue
GetEnvironmentStrings
GetTickCount
CompareStringA
GetCurrentThreadId
GetStdHandle
EnterCriticalSection
OpenMutexA
UnlockFileEx
ReadConsoleOutputCharacterW
FreeEnvironmentStringsA
EnumSystemLocalesA
TlsAlloc
CreateFileMappingA
CreateSemaphoreW
GetLastError
GetProcAddress
GetVersionExA
VirtualAlloc
LCMapStringW
GetStringTypeA
GetCurrentThread
HeapCreate
GetDateFormatA
GetLocaleInfoA
GetModuleFileNameA
SetStdHandle
WriteFile
VirtualQuery
GetCurrentProcessId
IsBadWritePtr
RtlUnwind
GetTimeFormatA
FlushFileBuffers
CloseHandle
GetLocaleInfoW
GetStartupInfoA
InterlockedExchange
GetACP
WideCharToMultiByte
LeaveCriticalSection
TerminateProcess
SetFileTime
LoadLibraryA
SetHandleCount
VirtualProtect
GetTimeZoneInformation
SetLastError
UnhandledExceptionFilter
CopyFileA
GetFileType
GetCurrentProcess
GetOEMCP
VirtualFree
HeapSize
GetPrivateProfileStringW
SetConsoleScreenBufferSize
EnumSystemCodePagesA
OpenFileMappingA
IsValidCodePage
GetCPInfo
TlsGetValue
SetThreadAffinityMask
GetSystemTimeAsFileTime
HeapDestroy
SleepEx
ReadFile
MultiByteToWideChar
InitializeCriticalSection
GetLongPathNameA
TlsFree
HeapReAlloc
ExitProcess
QueryPerformanceCounter
HeapFree
EnumSystemCodePagesW
HeapAlloc
GetStringTypeW
GetCommandLineA
GetModuleHandleA
CreateProcessA
GetUserDefaultLCID
GetSystemInfo
GlobalGetAtomNameW
GetProfileSectionA
GetVersionExW
IsValidLocale
GetEnvironmentStringsW
SetFilePointer
CompareStringW
FreeEnvironmentStringsW
LCMapStringA
SetEnvironmentVariableA
DeleteCriticalSection
comdlg32
LoadAlterBitmap
FindTextA
ChooseColorW
GetOpenFileNameW
Sections
.text Size: 173KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 310KB - Virtual size: 309KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 740B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ