Static task
static1
Behavioral task
behavioral1
Sample
3c0f5b49911783cea517a6356f5c34cb_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3c0f5b49911783cea517a6356f5c34cb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3c0f5b49911783cea517a6356f5c34cb_JaffaCakes118
-
Size
58KB
-
MD5
3c0f5b49911783cea517a6356f5c34cb
-
SHA1
e959eb6e3f9a8055818ae4220d03869f83ea6898
-
SHA256
2b4345842347af648ccf9d11f9b94986c5c38ef36a0e6a8239303f3d69a95a42
-
SHA512
5f54fcf3d1bda9f2329477e0f985ad6fb3b74a358ad49cc64b0142df2e86bf1dbd8f76c62a1e5031bd8752f8940d8a903b65ebfd46b38669e608b37e95506f86
-
SSDEEP
1536:jAQwU55kGEitfn7k5TFyQIyCJrRMlDKvrkhldH1+qkT:T5kGfVQUJrR4KYhldV+qkT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c0f5b49911783cea517a6356f5c34cb_JaffaCakes118
Files
-
3c0f5b49911783cea517a6356f5c34cb_JaffaCakes118.exe windows:4 windows x86 arch:x86
4cd1c8e97820da61f7f7ec7a919b952c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_GetIconSize
ImageList_LoadImageW
ImageList_DragShowNolock
ImageList_GetImageRect
ImageList_DragMove
ImageList_DragEnter
InitCommonControls
ImageList_LoadImage
ImageList_Draw
ImageList_Replace
ImageList_GetDragImage
ImageList_Read
ImageList_BeginDrag
ImageList_GetImageCount
ImageList_Create
ImageList_AddMasked
ImageList_Copy
ImageList_AddIcon
ImageList_GetImageInfo
ImageList_ReplaceIcon
ImageList_GetImageRect
InitCommonControls
ImageList_Draw
ImageList_Replace
ImageList_GetIconSize
ImageList_GetDragImage
ImageList_DragEnter
ImageList_DrawIndirect
ImageList_DragShowNolock
ImageList_DrawEx
ImageList_LoadImageW
ImageList_Copy
ImageList_DragLeave
ImageList_EndDrag
ImageList_Destroy
ImageList_GetImageInfo
ImageList_LoadImage
ImageList_AddIcon
ImageList_LoadImageA
ImageList_BeginDrag
kernel32
DeleteAtom
GetCPInfo
CopyFileW
ReadConsoleA
DeleteFileA
ExitThread
SetLastError
OpenFile
CopyFileExW
GlobalFree
CreateProcessA
CopyFileExA
ReadFile
GetConsoleMode
GetCommandLineA
CreateThread
GetFileSize
WriteFile
GetLastError
FindFirstFileA
GetComputerNameA
GetCPInfo
CopyFileExW
CreateDirectoryA
ReadConsoleA
FindFirstFileA
GetFileTime
GetConsoleMode
ReadFile
SetLastError
GetComputerNameA
CopyFileA
FindAtomA
OpenFile
CopyFileExA
DeleteFileA
CreateThread
OpenFileMappingA
GetCommandLineA
DeleteFileW
DeleteAtom
ExitThread
Sleep
SetLastError
CreateDirectoryA
CopyFileExW
ReadConsoleA
DeleteFileA
GetFileSize
OpenFile
Sleep
GetComputerNameA
CreateProcessA
DeleteFileW
CopyFileA
FindFirstFileA
GetCPInfo
WriteFile
OpenFileMappingA
GlobalFree
CopyFileExA
advapi32
RegOpenKeyExA
RegDeleteKeyW
RegDeleteValueA
RegEnumKeyExA
RegCreateKeyExA
RegQueryValueExW
RegReplaceKeyA
RegQueryValueA
RegOpenKeyExW
RegCreateKeyW
RegCreateKeyExW
RegEnumValueW
RegReplaceKeyW
RegQueryInfoKeyW
RegDeleteValueW
RegQueryInfoKeyA
RegEnumKeyW
RegDeleteKeyA
RegEnumKeyW
RegReplaceKeyW
RegQueryValueExW
RegDeleteKeyW
RegDeleteValueA
RegQueryValueW
RegDeleteValueW
RegCreateKeyExW
RegLoadKeyA
RegEnumValueW
RegQueryInfoKeyW
RegQueryInfoKeyA
RegOpenKeyExW
RegOpenKeyA
RegFlushKey
user32
InsertMenuA
IsWindow
GetMenu
LoadMenuA
AlignRects
GetDC
CopyImage
CopyRect
GetFocus
BlockInput
DrawTextA
AppendMenuA
LoadCursorA
IsMenu
DialogBoxParamW
DrawIcon
DialogBoxParamA
GetCursor
DrawIconEx
EndDialog
CreateIcon
GetWindowTextLengthA
AppendMenuW
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ