Static task
static1
Behavioral task
behavioral1
Sample
3b0bf17c75b94b8870b7c8e994072ea3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3b0bf17c75b94b8870b7c8e994072ea3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3b0bf17c75b94b8870b7c8e994072ea3_JaffaCakes118
-
Size
384KB
-
MD5
3b0bf17c75b94b8870b7c8e994072ea3
-
SHA1
5be5bb9a3830377265adb801f8508cfab3001536
-
SHA256
c83369a0101f9290ffdb0ff99c9be0cd7054a8f6d568f3e342c3160c1d26582e
-
SHA512
c9bc1708cc6bbd48fc889384649c2c230a3324607519287e60be62e8d5f3bf84ebcdcb14031f59d9f6aecd429ca25da2ee527258080a2739e3aa8250031d91f4
-
SSDEEP
6144:PCM2iO78664YA5zrVY1iU+IeRYPTRXZx:KM2iO4rvkhYh+dW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b0bf17c75b94b8870b7c8e994072ea3_JaffaCakes118
Files
-
3b0bf17c75b94b8870b7c8e994072ea3_JaffaCakes118.exe windows:4 windows x86 arch:x86
481fbf3e114c2a3d73875dc8c10df408
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
FreeSid
GetSecurityDescriptorControl
GetUserNameA
LockServiceDatabase
LookupPrivilegeValueA
RegDeleteKeyA
RegDeleteValueA
RegEnumValueA
RegQueryValueExA
RegSetValueExA
kernel32
AddAtomA
CloseHandle
CreateDirectoryA
CreateEventA
CreateFileA
CreateFileMappingA
CreateMutexA
CreateThread
CreateToolhelp32Snapshot
DeleteAtom
DeleteCriticalSection
DeleteFileA
DuplicateHandle
EnterCriticalSection
EnumSystemLocalesA
ExitProcess
FileTimeToLocalFileTime
FindClose
FlushFileBuffers
FreeLibrary
GetCPInfo
GetComputerNameA
GetConsoleOutputCP
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsA
GetFullPathNameA
GetLastError
GetLocaleInfoA
GetModuleHandleA
GetPrivateProfileStringA
GetProcessHeap
GetStdHandle
GetStringTypeA
GetSystemDirectoryA
GetSystemInfo
GetSystemTimeAsFileTime
GetTempPathA
GetThreadLocale
GetTickCount
GetTimeZoneInformation
GetVersionExA
GetWindowsDirectoryA
GlobalLock
HeapFree
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedIncrement
IsDebuggerPresent
IsValidCodePage
LoadLibraryA
LoadLibraryExA
LoadResource
MapViewOfFile
Module32First
Module32Next
MoveFileExA
OpenProcess
OutputDebugStringA
QueryPerformanceCounter
RaiseException
ReadFile
ReadProcessMemory
RemoveDirectoryA
ResetEvent
ResumeThread
SetCurrentDirectoryA
SetEndOfFile
SetErrorMode
SetFileAttributesA
SetFilePointer
SetLastError
SetPriorityClass
SetStdHandle
SetUnhandledExceptionFilter
Sleep
SystemTimeToFileTime
TerminateProcess
TlsAlloc
TlsFree
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WritePrivateProfileStringA
lstrcmpA
lstrcmpiA
ole32
CoCreateGuid
CoTaskMemAlloc
CoTaskMemFree
ReleaseStgMedium
user32
CallWindowProcA
CharLowerA
CharUpperA
CreateDialogParamA
DefWindowProcA
DialogBoxParamA
DispatchMessageA
DrawIcon
ExitWindowsEx
GetActiveWindow
GetClassNameA
GetDC
GetDesktopWindow
GetDlgItem
GetForegroundWindow
GetSysColorBrush
GetWindowLongA
IntersectRect
IsDlgButtonChecked
KillTimer
LoadCursorA
MessageBeep
MessageBoxA
PeekMessageA
RegisterClassExA
RegisterWindowMessageA
SetCursor
SetDlgItemInt
SetMenu
SetTimer
UnhookWindowsHookEx
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
CODE Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CRT Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ