Static task
static1
Behavioral task
behavioral1
Sample
3c124d5f34c47500fe1fafab21a293ff_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3c124d5f34c47500fe1fafab21a293ff_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3c124d5f34c47500fe1fafab21a293ff_JaffaCakes118
-
Size
179KB
-
MD5
3c124d5f34c47500fe1fafab21a293ff
-
SHA1
2e03459107446ef54b531ddaec1df1978568275b
-
SHA256
4132ecdc4261fbd76800844d4517a9ce699820119b01e0eded3a3894b452cdb2
-
SHA512
3c4a6b89235c00ebc5c5fc1690b1337069b2c68b262e33b82f92beb3f486b7c38fbdd4ecdb5fa65ea986911bed55cfc729d118cb7f452602f7b75edf46d9e629
-
SSDEEP
3072:i1l7gYZzjsUjY6yOgYpk1DedZvQandkktVgfyEl7JVFS/Xmt9wQNSj:kl7gYZzwUDyOgz1DedZvQedXgX7Jf0Xn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c124d5f34c47500fe1fafab21a293ff_JaffaCakes118
Files
-
3c124d5f34c47500fe1fafab21a293ff_JaffaCakes118.exe windows:1 windows x86 arch:x86
2ea580f287ca48141a1f30d95d853230
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResetEvent
_hread
SetFileAttributesA
LocalAlloc
GetLogicalDriveStringsA
EnumTimeFormatsA
SetLocalPrimaryComputerNameA
GetComputerNameA
GetPrivateProfileSectionNamesA
GlobalReAlloc
GetCommandLineA
WriteProfileStringA
SetCommState
GetVolumeNameForVolumeMountPointA
GetFullPathNameA
MoveFileA
FindNextVolumeA
CreateWaitableTimerA
GetFileSizeEx
SearchPathA
UnregisterConsoleIME
CloseHandle
GetProcessHeap
UpdateResourceA
GetProcessIoCounters
EnumSystemCodePagesA
SetComputerNameExA
WriteConsoleInputA
ExpandEnvironmentStringsA
SetInformationJobObject
DeleteAtom
WriteConsoleA
OpenJobObjectA
EndUpdateResourceA
GetThreadTimes
GetConsoleOutputCP
GlobalHandle
GetDriveTypeA
LoadLibraryExW
OpenFile
SetCommMask
SetFilePointerEx
SetThreadIdealProcessor
lstrcmp
FindClose
Thread32Next
GetProcessTimes
CallNamedPipeA
PulseEvent
GetProcAddress
IsBadStringPtrA
GetLastError
GetProcessPriorityBoost
VirtualAllocEx
SetFilePointer
CreateFileA
GetBinaryType
GlobalFlags
GetLocalTime
RaiseException
CompareStringA
GetLocaleInfoA
GetModuleHandleA
TerminateThread
GetWindowsDirectoryA
_lread
LCMapStringA
user32
DrawIconEx
TranslateMessage
MessageBoxExA
EnumDisplaySettingsExA
DispatchMessageA
ChangeClipboardChain
SetMenuContextHelpId
DrawMenuBarTemp
InvalidateRect
CharLowerBuffA
GetKeyboardLayoutList
InflateRect
MenuWindowProcA
MenuItemFromPoint
IsWindow
MonitorFromRect
GrayStringA
IsWindow
EnumDesktopWindows
EnumPropsExW
SetShellWindow
HideCaret
SwitchToThisWindow
CreateMDIWindowA
DefFrameProcA
IsWinEventHookInstalled
SetSysColorsTemp
CreatePopupMenu
DeleteMenu
RegisterShellHookWindow
SetWindowStationUser
LoadRemoteFonts
GetMenuDefaultItem
DefMDIChildProcA
CalcMenuBar
LoadCursorFromFileA
IntersectRect
SetWindowPlacement
MonitorFromRect
UnhookWindowsHookEx
GetMenuItemInfoA
InsertMenuItemA
CreateWindowStationA
GrayStringA
RegisterDeviceNotificationA
CharLowerBuffA
UnregisterUserApiHook
TranslateAccelerator
UnregisterHotKey
SetShellWindowEx
EnumDisplayDevicesA
GetSubMenu
SetWindowsHookExA
InternalGetWindowText
SendMessageCallbackA
TabbedTextOutA
GetKeyboardLayout
LockWindowStation
LoadKeyboardLayoutA
GetDlgItemTextA
MenuItemFromPoint
advapi32
AddAccessDeniedObjectAce
Sections
.text Size: 142KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ