Static task
static1
Behavioral task
behavioral1
Sample
3ba7ad1824c1f36ddf451c61769ec79a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ba7ad1824c1f36ddf451c61769ec79a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3ba7ad1824c1f36ddf451c61769ec79a_JaffaCakes118
-
Size
183KB
-
MD5
3ba7ad1824c1f36ddf451c61769ec79a
-
SHA1
d16edf9407acf53f05bc5112ef91b927bc1960ce
-
SHA256
2e03bdcd4a5803539d2f5c89314e99982f18d0cfdc21d655b818f0f05ae5231e
-
SHA512
2a0a4feccb02a99a49bb076c542fc64e026e1d070c62d4e4e0692e7f058bb2ad8ffec9d1793dad96e2c1cf2e378eed73a5d84d1d7456b6f682272ce2dba68496
-
SSDEEP
3072:WM7zwPK391P1BHRtaMUsUeoxMnh9uJ9h+2+UZW5Cy74nQGxYnpYJ5w/E9pJDhzGj:WM7s2Bx4s7VnjGrgUZFu4nQsGyjwqpJM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ba7ad1824c1f36ddf451c61769ec79a_JaffaCakes118
Files
-
3ba7ad1824c1f36ddf451c61769ec79a_JaffaCakes118.exe windows:4 windows x86 arch:x86
2843334227806724744e58c1e6f94ed7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegDeleteKeyW
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
kernel32
GetSystemDirectoryA
CloseHandle
DeviceIoControl
GetHandleInformation
CreateFileA
ReadFile
SetFilePointer
GetLastError
GetVersionExA
WriteFile
GetSystemDirectoryA
QueryDosDeviceA
GetDriveTypeA
WaitForMultipleObjectsEx
SetWaitableTimer
CreateWaitableTimerA
CreateThread
InterlockedExchange
GetACP
GetLocaleInfoA
MultiByteToWideChar
WideCharToMultiByte
RaiseException
InitializeCriticalSection
DeleteCriticalSection
WaitForSingleObjectEx
CreateMutexA
ReleaseMutex
FreeLibrary
GetProcAddress
LoadLibraryA
GetModuleFileNameA
SetEvent
SuspendThread
ResumeThread
FindClose
FindNextFileA
FindFirstFileA
CreateDirectoryA
LeaveCriticalSection
EnterCriticalSection
GetOverlappedResult
DisconnectNamedPipe
ConnectNamedPipe
CreateEventA
OpenProcess
WaitForSingleObject
CreateNamedPipeA
GetTempPathA
GetCurrentProcessId
SetLastError
LocalFree
Sleep
OpenMutexA
GetLocalTime
GetTickCount
GetCurrentThreadId
GetFileAttributesA
GetFileAttributesExA
DeleteFileA
RemoveDirectoryA
MoveFileA
InterlockedCompareExchange
FormatMessageA
InterlockedDecrement
InterlockedIncrement
RtlUnwind
ExitProcess
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetModuleHandleA
GetCommandLineA
LCMapStringA
LCMapStringW
GetCPInfo
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
HeapReAlloc
TerminateProcess
GetCurrentProcess
HeapSize
QueryPerformanceCounter
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetOEMCP
SetUnhandledExceptionFilter
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
FlushFileBuffers
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetLocaleInfoW
SetEndOfFile
GetProcessHeap
winmm
timeGetDevCaps
timeEndPeriod
timeBeginPeriod
timeGetTime
crypt32
CertVerifyCertificateChainPolicy
setupapi
SetupIterateCabinetW
oleaut32
VariantInit
OleSavePictureFile
VarI8FromR8
SetErrorInfo
Sections
.text Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ