Static task
static1
Behavioral task
behavioral1
Sample
3bc55e608e090c5bb0bc1944261b4bb1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3bc55e608e090c5bb0bc1944261b4bb1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3bc55e608e090c5bb0bc1944261b4bb1_JaffaCakes118
-
Size
863KB
-
MD5
3bc55e608e090c5bb0bc1944261b4bb1
-
SHA1
43d8e9a8a8d94d2b4d99c77521c204a315d22ec2
-
SHA256
ccd1fef8c54827447cd1639e79dc9003ac6b2a4e8457a909bff4784f6624d048
-
SHA512
f0879edf37f8e978302eb3dd3de5170a95eb0c2639f74029cb25c37d7e45858b300f0a50df871620454ca6b08fea802cde44b072ab9fe8bd0d6c9456fba3a978
-
SSDEEP
24576:dDIcsVWeWZ95jhrcudfBfP+FBGJvVRtkS2DqP:ZsVUBrxBfP+LGJ9Rt1d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3bc55e608e090c5bb0bc1944261b4bb1_JaffaCakes118
Files
-
3bc55e608e090c5bb0bc1944261b4bb1_JaffaCakes118.exe windows:4 windows x86 arch:x86
888c7242bd8efd553f8fc977b52d16d1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrRChrIA
PathGetDriveNumberA
PathSearchAndQualifyA
PathMakePrettyA
PathFindOnPathA
UrlCombineA
HashData
SHIsLowMemoryMachine
SHRegCreateUSKeyA
ColorHLSToRGB
PathCommonPrefixA
PathIsRelativeA
SHDeleteValueA
SHRegEnumUSKeyA
PathRemoveBlanksA
StrCSpnA
StrSpnA
StrChrIA
PathIsFileSpecA
PathStripToRootA
UrlIsOpaqueA
SHRegOpenUSKeyA
PathFileExistsA
PathAppendA
StrToIntExA
StrIsIntlEqualA
PathIsUNCA
SHAutoComplete
SHRegWriteUSValueA
StrFormatByteSize64A
UrlGetLocationA
kernel32
GetDriveTypeA
FillConsoleOutputAttribute
GetPrivateProfileIntA
GetProcessHeaps
GetPrivateProfileStructA
SetCommMask
PurgeComm
VirtualAlloc
VirtualFree
SetConsoleOutputCP
CommConfigDialogA
ResumeThread
SystemTimeToTzSpecificLocalTime
SetConsoleTextAttribute
SetTimeZoneInformation
EnumSystemLocalesA
SetNamedPipeHandleState
FreeConsole
GetCommState
GlobalUnlock
QueryPerformanceCounter
OpenSemaphoreA
GetCurrentDirectoryA
IsBadHugeReadPtr
_llseek
TlsFree
OpenProcess
IsBadReadPtr
GetLocalTime
lstrcpy
_lread
_hread
SetSystemTime
GetSystemPowerStatus
WriteConsoleOutputAttribute
WaitNamedPipeA
SetTapeParameters
IsBadWritePtr
Heap32ListNext
GetLongPathNameA
GetShortPathNameA
UTRegister
InterlockedExchange
GetConsoleTitleA
DeleteFileA
WriteFileGather
GetExitCodeThread
LocalFileTimeToFileTime
GetTickCount
Beep
WinExec
SleepEx
GetWindowsDirectoryA
CloseHandle
SetConsoleCtrlHandler
MoveFileA
CreateThread
ClearCommBreak
PeekNamedPipe
advapi32
EnumDependentServicesA
Sections
.czels Size: 638KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.yjq Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.liza Size: 19KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fex Size: 512B - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mpst Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ajk Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xwv Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.uvu Size: 49KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pgfc Size: 124KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ