Static task
static1
Behavioral task
behavioral1
Sample
3b6d45db3bf8feb3b99ea06e1def1cde_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3b6d45db3bf8feb3b99ea06e1def1cde_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3b6d45db3bf8feb3b99ea06e1def1cde_JaffaCakes118
-
Size
271KB
-
MD5
3b6d45db3bf8feb3b99ea06e1def1cde
-
SHA1
bc109305aa2052ffbdb3a6b0d90fec088d6d18c8
-
SHA256
389bb9799f7d242d5cf856a712d24a453636ff2b64a192798424ba4ba5ab4530
-
SHA512
c4314ef1f6bc2a2febfcce62d53c056091a3d478b8f20bca8a3a789cba9364c91735dd69107e3f68206a0a36e3f5014a945ce01d6f65fb99df7fec2f431975d8
-
SSDEEP
6144:fIm94//Xhc41iWLTYRXIDC9nytxoZHV8ad1PQMxszUHj9KxnLf:Qr//xc41iWwcCZyfoZHV8uQJzUQnLf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b6d45db3bf8feb3b99ea06e1def1cde_JaffaCakes118
Files
-
3b6d45db3bf8feb3b99ea06e1def1cde_JaffaCakes118.exe windows:4 windows x86 arch:x86
8d87a2588b5490767d5e27580c4e2b4a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
ChooseFontW
GetOpenFileNameA
ChooseColorW
kernel32
Sleep
TlsSetValue
GetStdHandle
GetLocalTime
GetProcAddress
HeapAlloc
GetEnvironmentStringsW
WriteFile
GlobalDeleteAtom
GetLogicalDriveStringsW
DeleteCriticalSection
FreeEnvironmentStringsW
GetTimeZoneInformation
TlsFree
GetCurrentProcess
GetVersion
HeapCreate
GetCurrentThread
MultiByteToWideChar
GetSystemTimeAsFileTime
GetModuleHandleA
WriteConsoleInputW
InterlockedDecrement
GetSystemTime
OpenMutexA
CompareStringW
VirtualQuery
FindAtomW
HeapReAlloc
ExitProcess
SetFilePointer
DuplicateHandle
TerminateProcess
QueryPerformanceCounter
GetCalendarInfoW
GetACP
GetModuleFileNameW
UnhandledExceptionFilter
GetCommandLineA
WriteConsoleOutputCharacterA
ReadFile
LeaveCriticalSection
SetEnvironmentVariableA
InterlockedIncrement
GetCPInfo
GetLastError
OpenSemaphoreW
GetProfileIntW
IsValidCodePage
GetComputerNameA
GetModuleFileNameA
SetHandleCount
CreateProcessA
SetLastError
SetStdHandle
LCMapStringW
LoadLibraryA
GetOEMCP
HeapDestroy
VirtualFree
TlsAlloc
GetStartupInfoA
GetEnvironmentStrings
FlushFileBuffers
WideCharToMultiByte
CreateMutexA
GetThreadSelectorEntry
VirtualAlloc
IsBadWritePtr
GetStringTypeA
LCMapStringA
InterlockedExchange
WriteConsoleOutputW
GlobalAddAtomW
RemoveDirectoryW
CloseHandle
TlsGetValue
RtlUnwind
CompareStringA
HeapFree
GetFileType
GetCurrentThreadId
GetStringTypeW
GetConsoleCP
GetCurrentProcessId
FreeEnvironmentStringsA
EnterCriticalSection
GetTickCount
InitializeCriticalSection
comctl32
InitCommonControlsEx
user32
SetScrollInfo
DrawFrameControl
RegisterClassExA
GetMenuDefaultItem
GetWindowModuleFileNameW
IsDlgButtonChecked
SetRect
GetKeyboardLayoutNameW
CharUpperW
LoadIconA
RealChildWindowFromPoint
ValidateRgn
RegisterClassA
GetMenu
GetClassNameW
VkKeyScanExA
CharUpperA
wsprintfA
ChangeDisplaySettingsW
DrawAnimatedRects
wininet
IsHostInProxyBypassList
FtpFindFirstFileW
FtpOpenFileA
InternetOpenW
InternetGoOnline
shell32
FreeIconList
DragFinish
ShellHookProc
RealShellExecuteExW
RealShellExecuteA
advapi32
LookupPrivilegeNameW
RegSaveKeyA
CryptSetHashParam
CryptSignHashA
GetUserNameA
Sections
.text Size: 159KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ