g:\noy
Static task
static1
Behavioral task
behavioral1
Sample
3be966c1782fecbd6c4e0da00ae22cc0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3be966c1782fecbd6c4e0da00ae22cc0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3be966c1782fecbd6c4e0da00ae22cc0_JaffaCakes118
-
Size
328KB
-
MD5
3be966c1782fecbd6c4e0da00ae22cc0
-
SHA1
36981309cf46f025d89f6e234d7222648f775025
-
SHA256
d33608f6fc25eafbd3c78dec88f31933a92529a1bc48ea893cb585ac3cf5ada6
-
SHA512
36bd96c0872e5530f5d7e2f5ff4b2904477fe2264a3b7f3d9d4a4159181aa9d8911680517b269d1099ab92e970c5e6c5a1f8f6a05a542b652a5ab1b6e5a096c1
-
SSDEEP
6144:duoL1U9T1POV4mFxkzpab9Jibs4NdYrzMOT70zR6MFHAUewRH6IUBnssNXLElhKq:duoZU9T1POmaxkzpab9JiIWYPMOs5HAF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3be966c1782fecbd6c4e0da00ae22cc0_JaffaCakes118
Files
-
3be966c1782fecbd6c4e0da00ae22cc0_JaffaCakes118.exe windows:4 windows x86 arch:x86
57412a918de00aedbf867a47057bcd7f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
CreateUpDownControl
ImageList_AddIcon
ImageList_GetIcon
InitCommonControlsEx
ImageList_GetDragImage
ImageList_GetFlags
ImageList_LoadImageA
ImageList_BeginDrag
ImageList_SetFlags
ImageList_GetIconSize
ImageList_SetDragCursorImage
MakeDragList
DrawInsert
ImageList_AddMasked
ImageList_GetImageInfo
ImageList_SetIconSize
CreateToolbar
ImageList_SetOverlayImage
ImageList_SetFilter
ImageList_DragShowNolock
ImageList_Draw
ImageList_Destroy
kernel32
FreeEnvironmentStringsW
GetCommandLineA
GetTimeFormatA
ReadFile
GetLastError
CloseHandle
GetModuleFileNameA
GetUserDefaultLCID
EnterCriticalSection
GetModuleFileNameW
SetStdHandle
SetHandleCount
SetFilePointer
GetProcAddress
RtlUnwind
HeapFree
LockFile
GetModuleHandleA
WriteConsoleW
SetEnvironmentVariableA
GetModuleHandleW
GetDateFormatA
GetEnvironmentStringsW
UnhandledExceptionFilter
IsValidCodePage
GetStringTypeW
InterlockedExchange
GetStringTypeA
CompareStringA
IsDebuggerPresent
WriteConsoleInputA
GetSystemTimeAsFileTime
LCMapStringA
Sleep
SetConsoleCtrlHandler
QueryPerformanceCounter
ExitProcess
IsValidLocale
VirtualAlloc
InterlockedDecrement
EnumSystemLocalesA
OpenMutexA
TlsGetValue
VirtualFree
VirtualQuery
WriteFile
GetLocaleInfoA
TerminateProcess
GetCurrentProcessId
HeapAlloc
GetStartupInfoW
WriteConsoleA
WideCharToMultiByte
GetCommandLineW
CompareStringW
GetConsoleCP
MultiByteToWideChar
GetCurrentProcess
GetStdHandle
InitializeCriticalSectionAndSpinCount
FlushFileBuffers
LoadLibraryA
HeapSize
InterlockedIncrement
HeapCreate
GetStartupInfoA
GetOEMCP
LCMapStringW
TlsAlloc
LeaveCriticalSection
GetACP
CreateFileA
GetCurrentThreadId
HeapReAlloc
GetLocaleInfoW
SetThreadIdealProcessor
SetUnhandledExceptionFilter
HeapDestroy
GetConsoleOutputCP
TlsSetValue
FreeLibrary
TlsFree
SetLastError
DeleteCriticalSection
GetTickCount
GetCPInfo
GetConsoleMode
CreateMutexA
GetTimeZoneInformation
GetFileType
GetCurrentThread
shell32
SHFileOperation
FindExecutableA
comdlg32
PrintDlgW
PageSetupDlgA
FindTextA
wininet
HttpSendRequestExA
DeleteIE3Cache
InternetWriteFile
user32
CreateWindowExW
GetClassNameA
GetIconInfo
MapVirtualKeyA
PeekMessageA
SetDlgItemTextA
RemovePropA
SetDlgItemInt
SetScrollInfo
SendMessageTimeoutA
PostMessageA
ShowWindow
SetClassLongA
IsWindowVisible
MapVirtualKeyW
GetFocus
DialogBoxIndirectParamW
DefWindowProcW
IsDialogMessageW
CreateWindowExA
RegisterClassExA
MessageBoxA
FreeDDElParam
RegisterClassA
DestroyWindow
CreateWindowStationA
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ