Static task
static1
Behavioral task
behavioral1
Sample
3f13769317b05c363abfa71c8fcac830_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3f13769317b05c363abfa71c8fcac830_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3f13769317b05c363abfa71c8fcac830_JaffaCakes118
-
Size
85KB
-
MD5
3f13769317b05c363abfa71c8fcac830
-
SHA1
92cbd291128c62062df12603a560c21ca70fa2b1
-
SHA256
97dc5a8514908d8234232414fc56e39350d23c7ba9ae03f10a5f9ec355a7798e
-
SHA512
68bda1c0b6798048a2d67c43683cda2f7a100c6da4410ebfea2d1cee6fe450b6d3985989bad42dc94f964ba2ef90cd9ba59598dfc9e3627c10b3e66420ee87ed
-
SSDEEP
768:Y7fXgXODKQboik8JQARNAZtbnMLWWcYd6NilJ+:Y7t3boX8JP/A/nEWfbil0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f13769317b05c363abfa71c8fcac830_JaffaCakes118
Files
-
3f13769317b05c363abfa71c8fcac830_JaffaCakes118.exe windows:4 windows x86 arch:x86
a33e40346cb4ddaff78c494b881a00f7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
timeGetTime
kernel32
ExitProcess
Sleep
CreateThread
CloseHandle
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
GetProcAddress
WriteProcessMemory
VirtualAllocEx
OpenProcess
lstrlenW
lstrlenA
GetCurrentProcess
GetModuleHandleA
CreateMutexA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
ReadFile
SetEndOfFile
SetFilePointer
GetCPInfo
GetOEMCP
GetACP
GetModuleFileNameA
VirtualProtect
GetLastError
QueryPerformanceCounter
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapFree
TerminateProcess
GetSystemInfo
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
InterlockedExchange
VirtualQuery
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapAlloc
VirtualAlloc
HeapReAlloc
SetStdHandle
FlushFileBuffers
CreateFileA
LoadLibraryA
user32
CreateDialogParamA
ShowWindow
UpdateWindow
LoadCursorA
GetMessageA
TranslateMessage
DispatchMessageA
SetCursor
SetDlgItemTextA
wsprintfW
FindWindowA
GetWindowThreadProcessId
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
Sections
.text Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 336KB - Virtual size: 333KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ