Static task
static1
Behavioral task
behavioral1
Sample
3f3817cb8bb4e4020864e597b2f35004_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3f3817cb8bb4e4020864e597b2f35004_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3f3817cb8bb4e4020864e597b2f35004_JaffaCakes118
-
Size
186KB
-
MD5
3f3817cb8bb4e4020864e597b2f35004
-
SHA1
9c10408f6341cd25c510d2e036920cc37524b80f
-
SHA256
89ce8b8f733549bcd5e941346e2d27314138638542e836687740ed628ebfa3c4
-
SHA512
74bc950d670a4fe58a2cb15f4268422680b6541b70195575882bfa9add31b4551f14f4ea4b294595d5d1aeb93e8b09625cf5c9b89981e5518861f8e64a50417e
-
SSDEEP
3072:nDzLxSIfXMemsFfl29Jrmka3T08haiQgYmHzsCEiC5TobHYO5V1y:DzLxSIPdt+JKb3I8htjYmHTEnGzYO5V0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f3817cb8bb4e4020864e597b2f35004_JaffaCakes118
Files
-
3f3817cb8bb4e4020864e597b2f35004_JaffaCakes118.exe windows:4 windows x86 arch:x86
aaaf6996320a1eae131b242882b608f1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
AdjustWindowRectEx
InvalidateRect
GetClientRect
PostMessageW
GetWindowPlacement
SetCursor
SetRectEmpty
FillRect
msvfw32
ICSendMessage
ICClose
ICOpen
ICDecompress
advapi32
RegCreateKeyW
RegQueryValueExW
RegCloseKey
RegSetValueExW
RegOpenKeyExW
RegDeleteKeyW
RegEnumKeyExW
RegSetValueW
kernel32
GetShortPathNameA
LoadLibraryW
UnhandledExceptionFilter
GetFileInformationByHandle
CreateFileW
GetProcAddress
CloseHandle
EnumResourceTypesW
GetCurrentThreadId
ExitProcess
GetLastError
GetCurrentProcessId
GetModuleHandleW
GlobalFree
GetVersionExW
Sections
.text Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 368KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ