Static task
static1
Behavioral task
behavioral1
Sample
3797a50e0c504ca1238bc93cf55a3dfd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3797a50e0c504ca1238bc93cf55a3dfd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3797a50e0c504ca1238bc93cf55a3dfd_JaffaCakes118
-
Size
396KB
-
MD5
3797a50e0c504ca1238bc93cf55a3dfd
-
SHA1
40fcc452009f08ed94552010a15d8012e518a11c
-
SHA256
293a8247c2075fe8aad08652e91744d9f27fac0d1b388b61b57feb1e02927db2
-
SHA512
b224fded7990ddd895b680d78a4912a6406f1b4f0ba1430bbb70ccaa989a77346728d6369165d592be482179fba9dbdee5a6cdf5c7dcafc1d8d3c6cb1c70a131
-
SSDEEP
6144:0UEr5etj2LKmHztvcPF2mjjkdn+RU7krftXeoPj2WfhV23W8tOCz:0UEr5WaLVzTm8dn+RbiWfPgOCz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3797a50e0c504ca1238bc93cf55a3dfd_JaffaCakes118
Files
-
3797a50e0c504ca1238bc93cf55a3dfd_JaffaCakes118.exe windows:4 windows x86 arch:x86
c31e740da646a821987d3e0cd89ea3ac
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
PulseEvent
DeleteTimerQueue
OpenEventA
GetProcAddress
GetModuleHandleA
GetLastError
HeapFree
HeapAlloc
OpenFileMappingA
VirtualProtect
Sleep
GetSystemInfo
CloseHandle
HeapCreate
WriteFile
LockFile
SetFilePointer
ReadFile
CreateFileA
VirtualQuery
RtlUnwind
GetLocalTime
UnlockFile
GlobalLock
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
TerminateProcess
GetCurrentProcess
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
SetLastError
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
VirtualFree
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
user32
SendMessageA
CreateWindowExA
IsIconic
GetSysColorBrush
GetWindow
LoadCursorA
wsprintfA
advapi32
ConvertSidToStringSidW
EqualSid
shell32
DuplicateIcon
psapi
GetModuleBaseNameA
GetProcessMemoryInfo
msvfw32
DrawDibClose
ICClose
DrawDibOpen
DrawDibGetBuffer
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 172KB - Virtual size: 563KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 116KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ