Static task
static1
Behavioral task
behavioral1
Sample
3be3101d2698adf3fa0410bc205bb8ba_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3be3101d2698adf3fa0410bc205bb8ba_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3be3101d2698adf3fa0410bc205bb8ba_JaffaCakes118
-
Size
332KB
-
MD5
3be3101d2698adf3fa0410bc205bb8ba
-
SHA1
636c09a20c26a8491d8bbf9db4076001265e15a4
-
SHA256
7398fd1cf58073443e03e59699817498ff815ecbbd5b19e8d21491727ef821cd
-
SHA512
c675d493a1def998c9dec9eaec77e3265b91f528044c434b83ca2e3e8cfcbac7267cf04b5d1d6ab365a3b4d5de27b0b4ad57b0dbd55ebeaff93d19ebcdc9ac56
-
SSDEEP
6144:4pIoxuuQBdzZWa16akdTbkPT3ItbqXlvixZF9+RuYZ+OUePxJf85rCVGwvU:4pIO8dzZP6xfkb3IVPUuLhePP85ruGwc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3be3101d2698adf3fa0410bc205bb8ba_JaffaCakes118
Files
-
3be3101d2698adf3fa0410bc205bb8ba_JaffaCakes118.exe windows:4 windows x86 arch:x86
d1213e8f6d073044310568b727676b82
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
FlushConsoleInputBuffer
WritePrivateProfileStringW
GetTickCount
IsBadStringPtrA
FindFirstFileA
GlobalFindAtomA
CreatePipe
SetCommTimeouts
GetShortPathNameA
GetCommandLineW
SetConsoleWindowInfo
VirtualQuery
SetEnvironmentVariableW
GetSystemInfo
GetDiskFreeSpaceExA
SetConsoleActiveScreenBuffer
_lopen
SetConsoleCursorPosition
FindCloseChangeNotification
OutputDebugStringA
GetComputerNameW
GetACP
CreateWaitableTimerA
GetProfileStringA
CreateProcessA
_lclose
VirtualProtect
GetVersionExA
SetSystemTime
GetOverlappedResult
VirtualAllocEx
DosDateTimeToFileTime
GetTimeZoneInformation
InitializeCriticalSection
TlsGetValue
SetEvent
GetLargestConsoleWindowSize
ReadFileScatter
CreateDirectoryA
FreeLibrary
FileTimeToLocalFileTime
CreateEventA
VirtualQueryEx
QueryDosDeviceA
CloseHandle
TryEnterCriticalSection
GetBinaryTypeW
EnumSystemCodePagesW
ScrollConsoleScreenBufferA
lstrcmpA
SetVolumeLabelA
ReleaseMutex
GetVolumeInformationW
GetSystemTimeAsFileTime
GetThreadPriority
GetCommandLineA
lstrlenA
GetThreadContext
ExitProcess
user32
GetMenuItemCount
TabbedTextOutA
MsgWaitForMultipleObjects
GetUserObjectInformationA
PostThreadMessageW
DeferWindowPos
OpenClipboard
SetUserObjectSecurity
FlashWindow
MenuItemFromPoint
CopyAcceleratorTableA
InternalGetWindowText
RegisterClipboardFormatA
LoadStringA
GetWindowRect
EnumWindowStationsA
OpenWindowStationA
SendNotifyMessageA
gdi32
CreateBitmapIndirect
CloseMetaFile
SetSystemPaletteUse
SetEnhMetaFileBits
StretchDIBits
SetBitmapBits
GetTextFaceW
Polyline
EndPage
CreateDCW
GetTextColor
CreatePolyPolygonRgn
EnumEnhMetaFile
GetTextMetricsW
PlayMetaFile
RemoveFontResourceW
PlayEnhMetaFileRecord
InvertRgn
SetDIBColorTable
DeleteObject
ExtTextOutW
comdlg32
ChooseFontW
PrintDlgW
GetOpenFileNameW
advapi32
AdjustTokenPrivileges
RegLoadKeyA
RegCreateKeyExW
RegGetKeySecurity
shell32
ExtractIconA
DragAcceptFiles
DragFinish
FindExecutableA
ole32
CoImpersonateClient
OleSetContainedObject
CoResumeClassObjects
OleCreateLink
OleRegGetMiscStatus
OleInitialize
oleaut32
SafeArrayRedim
comctl32
PropertySheetA
CreateToolbarEx
ImageList_SetBkColor
shlwapi
StrRetToStrW
PathRemoveExtensionW
PathIsRootW
setupapi
SetupDiClassNameFromGuidW
SetupDiEnumDriverInfoW
SetupGetLineTextA
Sections
.text Size: 284KB - Virtual size: 283KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE