f:\sdxizpecd\ecw\
Static task
static1
Behavioral task
behavioral1
Sample
3992f52e1e0f637fda031d822ab031d3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3992f52e1e0f637fda031d822ab031d3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3992f52e1e0f637fda031d822ab031d3_JaffaCakes118
-
Size
348KB
-
MD5
3992f52e1e0f637fda031d822ab031d3
-
SHA1
667080437793f6b22be614dcf41d8091f33b9fb9
-
SHA256
11a77766c083b69861b562a27c754bdb00dd44e3e088340023fe7a4cc460f428
-
SHA512
0360b6cdcfdff38a4aa29ee0e88b260b4aa40f594cd97cc56416a4e160f78a6ff099916f54ee065b3b94336455a422503ccc9edf82276ccfb3c89edb5e425cbd
-
SSDEEP
6144:QLTdl8tjsDEkfTQvVjJgAbs+7ADnw+EQnNHsFJoiEfPTi/h7kCjhdCoCqdyHS4:QLTfEkfTqKT+7Uw+EQnqoXfbi/ht98HH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3992f52e1e0f637fda031d822ab031d3_JaffaCakes118
Files
-
3992f52e1e0f637fda031d822ab031d3_JaffaCakes118.exe windows:4 windows x86 arch:x86
3a551713b5afae7df5b7922275f3066e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
SHFormatDrive
SHGetDataFromIDListW
SHAppBarMessage
SHFileOperationA
SHLoadInProc
comctl32
ImageList_Add
ImageList_Create
CreateToolbar
ImageList_GetImageInfo
DestroyPropertySheetPage
ImageList_GetFlags
ImageList_DrawEx
CreatePropertySheetPageA
InitCommonControlsEx
ImageList_LoadImageW
GetEffectiveClientRect
CreateUpDownControl
ImageList_GetIconSize
ImageList_DragMove
_TrackMouseEvent
ImageList_GetDragImage
ImageList_Write
wininet
InternetOpenUrlA
ShowClientAuthCerts
GopherGetLocatorTypeA
InternetOpenA
InternetConnectA
HttpSendRequestExA
InternetCreateUrlA
user32
CreateWindowStationW
IsMenu
CharPrevExA
EmptyClipboard
GetMenuStringA
GetScrollRange
RealChildWindowFromPoint
DdeGetData
DlgDirListComboBoxW
GetWindowRgn
LoadImageA
InSendMessageEx
SystemParametersInfoW
wsprintfW
SetWindowLongW
TranslateAcceleratorA
DefWindowProcA
DeleteMenu
MessageBoxIndirectW
RegisterClassA
DestroyWindow
WindowFromPoint
UnpackDDElParam
MessageBoxA
DefWindowProcW
BroadcastSystemMessageA
DdeCreateStringHandleW
RegisterClassExA
GetLastActivePopup
ShowWindow
GetClassLongA
ShowOwnedPopups
ChildWindowFromPointEx
GetClipboardSequenceNumber
CreateWindowExW
kernel32
CompareStringW
GetLogicalDriveStringsW
SetVolumeLabelW
GetCommandLineA
LoadLibraryExW
VirtualLock
GetStartupInfoA
SetConsoleCtrlHandler
TerminateProcess
Sleep
SetLastError
GetEnvironmentStringsW
TlsAlloc
GetDateFormatW
UnhandledExceptionFilter
RtlFillMemory
TryEnterCriticalSection
WriteConsoleA
TlsSetValue
LocalSize
HeapFree
GetEnvironmentVariableW
FlushFileBuffers
TlsFree
GetCurrentProcess
EnumResourceTypesW
VirtualQuery
IsValidLocale
CopyFileExA
ExitProcess
WriteProfileSectionA
SetLocaleInfoA
LCMapStringW
GetSystemTime
MultiByteToWideChar
VirtualFree
OpenMutexA
FreeEnvironmentStringsA
WriteConsoleW
HeapAlloc
GetCPInfo
GetStringTypeA
CompareFileTime
GetPrivateProfileStringA
WriteProfileStringW
GetModuleHandleA
UnlockFile
CompareStringA
GetFileSize
FreeEnvironmentStringsW
LocalCompact
InterlockedExchange
DeleteCriticalSection
SetHandleCount
GetProcAddress
EnumDateFormatsA
VirtualAlloc
GetStdHandle
GetConsoleMode
GetSystemDirectoryA
lstrcat
GetEnvironmentStrings
WideCharToMultiByte
IsValidCodePage
GetModuleHandleW
HeapCreate
TlsGetValue
GetComputerNameW
EnterCriticalSection
GetVersionExW
GetTimeZoneInformation
GetOEMCP
GetTimeFormatA
ReadConsoleW
HeapDestroy
HeapSize
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
SetFilePointer
GetCurrentProcessId
VirtualProtect
CloseHandle
LeaveCriticalSection
GetSystemDefaultLangID
LCMapStringA
IsDebuggerPresent
GlobalAddAtomA
QueryPerformanceCounter
GetNamedPipeInfo
GetTickCount
GlobalSize
InterlockedCompareExchange
GetACP
GetNamedPipeHandleStateA
GetConsoleCP
InterlockedIncrement
GetStringTypeW
GetConsoleOutputCP
GetFileType
RtlUnwind
CreateFileA
VirtualQueryEx
SetStdHandle
GetLastError
GetProcessShutdownParameters
FlushViewOfFile
LocalShrink
GetUserDefaultLCID
SetEnvironmentVariableA
GetNamedPipeHandleStateW
GetCurrentThread
CreateWaitableTimerW
CreateMutexA
HeapReAlloc
EnumSystemLocalesA
WaitCommEvent
GetCurrentDirectoryA
LoadLibraryA
GetLocaleInfoA
GetDateFormatA
FreeLibraryAndExitThread
InterlockedDecrement
ReadFile
GetFileTime
GetLocaleInfoW
SetSystemTime
GetSystemTimeAsFileTime
UnmapViewOfFile
GetProfileStringW
FileTimeToDosDateTime
FreeLibrary
GetCurrentThreadId
WriteFile
GetModuleFileNameA
comdlg32
GetOpenFileNameA
PageSetupDlgW
ReplaceTextW
gdi32
SetBkMode
SetAbortProc
FloodFill
CreateICA
GetTextColor
GetTextExtentPointW
ColorMatchToTarget
Polygon
RemoveFontResourceA
GetRgnBox
TextOutW
GetMetaFileBitsEx
PlgBlt
CreateScalableFontResourceW
GetCurrentObject
GetBitmapBits
GetStockObject
GetTextCharacterExtra
GetObjectType
PathToRegion
Sections
.text Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ