Static task
static1
Behavioral task
behavioral1
Sample
37cdacaa9e3c4dd02945c33ae408545c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
37cdacaa9e3c4dd02945c33ae408545c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
37cdacaa9e3c4dd02945c33ae408545c_JaffaCakes118
-
Size
167KB
-
MD5
37cdacaa9e3c4dd02945c33ae408545c
-
SHA1
c5b69145cbd9ee0f901effaa0886f1c1bca1f313
-
SHA256
35c3112c7fc91bd013dd72a802b99d6d548c1be56fdcd6c7c69cf2e819bc57ef
-
SHA512
59e11fce92669d949025c614640907888708563781121d60abb6d3ce0bf83fc3dd3269de126b201fad760aa9f28d5d294280283055feaef9da6b8d950800f8d3
-
SSDEEP
3072:l6FmjFBOMLzOWLfWPdPAutIfxRpwCj1ZqI7gYEiZNk/Xt0X5IdfvEfkZp:wFmzOMLzffSZAu+5RpjZqmciZqyX0vd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 37cdacaa9e3c4dd02945c33ae408545c_JaffaCakes118
Files
-
37cdacaa9e3c4dd02945c33ae408545c_JaffaCakes118.exe windows:4 windows x86 arch:x86
3cdcd9606fb5b3384d595470a749b01a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
CloseServiceHandle
DeleteService
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyA
RegOpenKeyExA
StartServiceA
kernel32
CreateDirectoryA
CreateEventA
CreateFileA
CreateFileMappingA
CreateMutexA
CreateThread
CreateToolhelp32Snapshot
DeleteAtom
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
EnumSystemLocalesA
ExitProcess
ExpandEnvironmentStringsA
FindResourceA
FlushFileBuffers
FreeLibrary
GetCPInfo
GetConsoleMode
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetDriveTypeA
GetEnvironmentVariableA
GetExitCodeProcess
GetFileAttributesA
GetFullPathNameA
GetLastError
GetLocalTime
GetModuleHandleA
GetPrivateProfileStructA
GetProcAddress
GetProcessHeap
GetStdHandle
GetSystemTimeAsFileTime
GetTempFileNameA
GetThreadTimes
GetTimeFormatA
GetUserDefaultLCID
GetVersionExA
GetWindowsDirectoryA
GlobalReAlloc
HeapAlloc
HeapDestroy
InitializeCriticalSection
InterlockedCompareExchange
InterlockedIncrement
IsBadReadPtr
IsDebuggerPresent
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadResource
LocalFree
Module32Next
MoveFileA
MulDiv
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
ReadFile
ReadProcessMemory
ResetEvent
ResumeThread
RtlUnwind
SetCurrentDirectoryA
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFileAttributesA
SetFilePointer
SetStdHandle
Sleep
TlsFree
UnhandledExceptionFilter
UnmapViewOfFile
VirtualQuery
WaitForSingleObject
WriteConsoleA
WritePrivateProfileStringA
lstrcpyA
lstrcpynA
user32
BeginPaint
CheckMenuItem
DefWindowProcA
DestroyWindow
EndDialog
FindWindowA
GetMessageA
GetMessagePos
GetSysColor
GetWindowTextLengthA
IsRectEmpty
MapWindowPoints
MessageBeep
MessageBoxA
MoveWindow
PostMessageA
RegisterClassA
RegisterWindowMessageA
ReleaseCapture
SetCursor
SetDlgItemInt
SetForegroundWindow
SetRect
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.DATA Size: 115KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ