Static task
static1
Behavioral task
behavioral1
Sample
3860b4182414441aaf4b9097fe714323_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3860b4182414441aaf4b9097fe714323_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3860b4182414441aaf4b9097fe714323_JaffaCakes118
-
Size
240KB
-
MD5
3860b4182414441aaf4b9097fe714323
-
SHA1
e5031826513d993e350f4d2ab08d64890ba491f1
-
SHA256
d8b1322d2fe1fad5721c5baf79babf942ff871dc417e1bf24d004235ffbde7e7
-
SHA512
52699e3b181a365b494e9118d3a065a1d115099215e513d2489eca39127c90899d146963616d38f9181eddb4820a6f9d58d0f417bc059a697dcb05325417d81f
-
SSDEEP
3072:zUuPfoOSA7jEhCI5tq0Tgv1uYJpRfiupvurmvYarZ+Jdz+IWky5cXjrJm5XWYpr7:zUiSAkoIPqbv1TfiupYgYaAJdCqd0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3860b4182414441aaf4b9097fe714323_JaffaCakes118
Files
-
3860b4182414441aaf4b9097fe714323_JaffaCakes118.exe windows:5 windows x86 arch:x86
cb62afda5a66eca097a889af3ca2eaa2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
kernel32
WaitForSingleObject
SetEvent
ResetEvent
WaitForMultipleObjects
VirtualAlloc
VirtualFree
GetProcAddress
GetModuleHandleA
MultiByteToWideChar
WideCharToMultiByte
GetLastError
LoadLibraryA
AreFileApisANSI
GetModuleFileNameA
GetModuleFileNameW
LocalFree
FormatMessageA
FormatMessageW
SetFileAttributesA
RemoveDirectoryA
SetCurrentDirectoryA
CreateDirectoryA
DeleteFileA
SetFileAttributesW
RemoveDirectoryW
CreateDirectoryW
DeleteFileW
lstrlenA
GetFullPathNameA
GetCurrentDirectoryA
SetCurrentDirectoryW
GetCurrentDirectoryW
GetTempPathA
GetTempPathW
GetFullPathNameW
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
CreateFileA
GetFileSize
CreateThread
ReadFile
SetFileTime
WriteFile
SetEndOfFile
CreateFileW
CreateEventA
GetStdHandle
EnterCriticalSection
LeaveCriticalSection
GetUserDefaultLangID
EnumResourceLanguagesA
GetUserDefaultUILanguage
GetVersionExA
Sleep
SetLastError
DuplicateHandle
GetCurrentProcess
GetEnvironmentVariableW
Process32Next
OpenProcess
Process32First
CreateToolhelp32Snapshot
GetExitCodeProcess
CreateProcessA
GetCommandLineW
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleMode
GetConsoleCP
GetLocaleInfoA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InitializeCriticalSectionAndSpinCount
CloseHandle
DeleteCriticalSection
InitializeCriticalSection
SetFilePointer
HeapSize
HeapCreate
HeapReAlloc
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
RaiseException
RtlUnwind
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
ExitProcess
GetCommandLineA
GetStartupInfoA
TlsGetValue
TlsAlloc
user32
CharLowerA
CharUpperA
DestroyWindow
PostMessageA
ShowWindow
EndDialog
KillTimer
SetTimer
SendMessageA
GetDlgItem
MessageBoxW
DialogBoxParamW
DialogBoxParamA
GetWindowLongA
SetWindowLongA
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
LoadStringW
LoadStringA
CharLowerW
CharUpperW
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
shell32
SHCreateDirectoryExW
SHGetPathFromIDListW
SHCreateDirectoryExA
ShellExecuteExA
SHBrowseForFolderW
ole32
OleInitialize
CoTaskMemFree
oleaut32
SysAllocString
VariantClear
Sections
.text Size: 151KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ