Static task
static1
Behavioral task
behavioral1
Sample
3864f261606a52d6dcd338cdf496544d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3864f261606a52d6dcd338cdf496544d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3864f261606a52d6dcd338cdf496544d_JaffaCakes118
-
Size
173KB
-
MD5
3864f261606a52d6dcd338cdf496544d
-
SHA1
4df9fd6ef2b026572b85b8f0199e6ebbf7c76b17
-
SHA256
f3472cb54df2dc9a818467eda81fa15f2b2d11e488d8cbac682f9aeebedb647c
-
SHA512
8183228c3a3faf605adba25f424b01ae902dbfa0297b0d87f0f7305e58f7615e7d6b1575c07fb73d2360150001ed620e9b1e8961f8b93d18596f38ed37e52f8c
-
SSDEEP
3072:h/R02Vho8HlL1pzXaKcJtq5Hc26kycgxQ0G4w8mwt69tX6Dj/:hqazqJtq5826kngfq6Dj/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3864f261606a52d6dcd338cdf496544d_JaffaCakes118
Files
-
3864f261606a52d6dcd338cdf496544d_JaffaCakes118.exe windows:4 windows x86 arch:x86
a3ff9c5eac580059dcff5d78c82d980e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThread
TlsSetValue
LocalAlloc
DeleteFileA
GetBinaryTypeA
GetVersion
lstrcatA
GlobalMemoryStatus
SetErrorMode
CreateThread
TlsAlloc
Beep
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetProcAddress
LoadLibraryA
IsBadReadPtr
lstrlenA
GetExitCodeThread
GetFileAttributesA
GetUserDefaultLangID
VerLanguageNameA
GlobalAlloc
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
HeapReAlloc
VirtualAlloc
WriteFile
LCMapStringW
RtlUnwind
VirtualFree
HeapCreate
ExitThread
TlsGetValue
SetFileAttributesA
LocalFree
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapAlloc
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
user32
wsprintfA
LoadImageA
FindWindowA
GetUpdateRect
LoadCursorFromFileA
CopyImage
GetDesktopWindow
EnumChildWindows
SetWindowTextA
UpdateWindow
GetWindowTextLengthA
GetWindowTextA
PostMessageA
GetQueueStatus
gdi32
GetObjectType
DeleteDC
DeleteObject
Sections
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 148KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ijzhvfs Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE