Static task
static1
Behavioral task
behavioral1
Sample
3c37b7d1330d1ed50cf7b5bff44e4ffb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3c37b7d1330d1ed50cf7b5bff44e4ffb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3c37b7d1330d1ed50cf7b5bff44e4ffb_JaffaCakes118
-
Size
620KB
-
MD5
3c37b7d1330d1ed50cf7b5bff44e4ffb
-
SHA1
e491e0b63b189d1cf0c902e2fb36b367c3fe65ac
-
SHA256
ca2d69f850e645cad6e089e089d78c448ed0997ae71f5a235d6b715e219c9e4c
-
SHA512
d57e7f4162dc8ee478ecbdde79218254fd43ac90a24b74ec6ef5f7ea243d67fddd71fc4448e24b91536711dc4343626fe561038f61debf0be85d51948e7d76df
-
SSDEEP
12288:sjN2oFxC9vbdllTz4JYdgXOB0leIIhFT2:sjN2oFxuzdlxIYdnS4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c37b7d1330d1ed50cf7b5bff44e4ffb_JaffaCakes118
Files
-
3c37b7d1330d1ed50cf7b5bff44e4ffb_JaffaCakes118.exe windows:5 windows x86 arch:x86
d92ade3c23dc78f2fdff265c21fbadf9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueA
RegCloseKey
RegOpenKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegQueryValueExA
GetUserNameA
RegEnumKeyExA
RegEnumValueA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
SetFileSecurityA
GetFileSecurityA
RegCreateKeyA
kernel32
GetCurrentThread
lstrcmpA
GetPrivateProfileIntA
GetPrivateProfileStringA
WritePrivateProfileStringA
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
GlobalFree
GetTempFileNameA
SetFileTime
GetFileTime
GetDiskFreeSpaceA
GetProcessVersion
GlobalFlags
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
DuplicateHandle
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
MoveFileA
GetVolumeInformationA
GetStringTypeExA
GetThreadLocale
LocalFileTimeToFileTime
SystemTimeToFileTime
SetErrorMode
GetProfileStringA
HeapFree
HeapAlloc
GetProcessHeap
RtlUnwind
ExitThread
CreateThread
HeapReAlloc
HeapSize
GetACP
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapDestroy
HeapCreate
VirtualFree
Sleep
VirtualProtect
VirtualAlloc
VirtualQuery
LCMapStringA
LCMapStringW
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SuspendThread
SetThreadPriority
MulDiv
lstrcmpiA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
lstrcatA
lstrcpynA
GlobalGetAtomNameA
GlobalAddAtomA
GetVersion
lstrcpyA
lstrlenA
SetEnvironmentVariableA
SearchPathA
GetLocalTime
GetFileInformationByHandle
GetFileType
GetEnvironmentVariableA
GetUserDefaultLangID
MultiByteToWideChar
CompareFileTime
GlobalAlloc
GlobalLock
GlobalUnlock
GetStartupInfoA
FindResourceA
LoadResource
LockResource
SizeofResource
GetWindowsDirectoryA
GetTempPathA
SetFileAttributesA
FileTimeToSystemTime
GetDateFormatA
GetTimeFormatA
GetFileSize
CreateFileMappingA
MapViewOfFile
GetShortPathNameA
FormatMessageA
LocalFree
ExitProcess
GetComputerNameA
GetSystemInfo
GlobalMemoryStatus
GetTimeZoneInformation
GetSystemTimeAsFileTime
FileTimeToLocalFileTime
GetSystemDefaultLangID
GetVersionExA
GetCurrentProcess
UnmapViewOfFile
WriteProcessMemory
FlushInstructionCache
ReadProcessMemory
VirtualQueryEx
VirtualProtectEx
WriteFile
ReadFile
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
GetLogicalDrives
GetDriveTypeA
SetFilePointer
ExpandEnvironmentStringsA
GetSystemDirectoryA
GetFileAttributesA
GetFullPathNameA
CreateFileA
FreeLibrary
GetCommandLineA
GetLocaleInfoA
CreateEventA
WaitForSingleObject
CreateProcessA
SetEvent
WaitForDebugEvent
ContinueDebugEvent
DeleteCriticalSection
GetCurrentThreadId
TerminateThread
TerminateProcess
GetModuleFileNameA
CloseHandle
GetThreadContext
LoadLibraryW
LoadLibraryExA
LoadLibraryExW
EnterCriticalSection
InitializeCriticalSection
RaiseException
SetLastError
GetLastError
SetThreadContext
GetProcAddress
LoadLibraryA
ResumeThread
GetTickCount
LeaveCriticalSection
gdi32
CreateDIBitmap
BitBlt
CombineRgn
SetRectRgn
CreateFontA
CreateCompatibleBitmap
CreateCompatibleDC
StretchDIBits
GetTextMetricsA
CreateRectRgnIndirect
PatBlt
Escape
TextOutA
RectVisible
PtVisible
CreatePatternBrush
CreateSolidBrush
GetDeviceCaps
CreateRectRgn
IntersectClipRect
ExcludeClipRect
SelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
RestoreDC
SaveDC
DeleteDC
CreateBitmap
GetClipBox
GetTextAlign
GetTextExtentPoint32A
SetTextAlign
SetBkColor
SetTextColor
ExtTextOutA
MoveToEx
LineTo
GetObjectA
CreateFontIndirectA
GetCharWidthA
DeleteObject
SelectObject
GetTextExtentPointA
GetStockObject
user32
GetSystemMetrics
GetClientRect
GetParent
MessageBeep
ReleaseDC
GetDC
CopyRect
DrawFocusRect
GetSysColor
GetMessageTime
GetSubMenu
LoadMenuA
IsIconic
OpenClipboard
GetMessagePos
CloseClipboard
SetClipboardData
EmptyClipboard
GetDesktopWindow
PtInRect
OffsetRect
ClientToScreen
SetActiveWindow
RegisterWindowMessageA
GetMenuItemCount
GetMenu
BringWindowToTop
CreateWindowExA
DefFrameProcA
TranslateMDISysAccel
TranslateAcceleratorA
DrawMenuBar
DefMDIChildProcA
SetWindowLongA
GetWindowLongA
SetWindowPos
RedrawWindow
AdjustWindowRectEx
GetMenuItemID
wsprintfA
GetActiveWindow
SetRectEmpty
LoadAcceleratorsA
ReleaseCapture
GetCapture
PeekMessageA
SetCursor
GetWindow
ShowWindow
DestroyMenu
GetClassInfoA
LoadIconA
SetMenu
ReuseDDElParam
UnpackDDElParam
GetDlgCtrlID
GetKeyState
EqualRect
IsWindowVisible
GetLastActivePopup
GetWindowPlacement
SystemParametersInfoA
IntersectRect
SetForegroundWindow
GetForegroundWindow
RemovePropA
CallWindowProcA
GetPropA
UnhookWindowsHookEx
SetPropA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
DestroyWindow
DefWindowProcA
TrackPopupMenu
RegisterClassA
IsChild
GetTopWindow
SetScrollPos
KillTimer
EndDeferWindowPos
BeginDeferWindowPos
DeferWindowPos
DispatchMessageA
MapWindowPoints
SendDlgItemMessageA
CheckDlgButton
GetDlgItemTextA
SetDlgItemTextA
IsDlgButtonChecked
IsDialogMessageA
MoveWindow
GetNextDlgTabItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
InflateRect
SetCapture
SetCursorPos
DestroyCursor
LoadCursorA
GetCursorPos
ValidateRect
TranslateMessage
GetMessageA
PostQuitMessage
CreateDialogIndirectParamA
EndDialog
ShowOwnedPopups
WaitMessage
GetWindowThreadProcessId
WindowFromPoint
SetParent
IsRectEmpty
AppendMenuA
DeleteMenu
GetSystemMenu
GetSysColorBrush
GetClassNameA
LoadStringA
FindWindowA
FillRect
InsertMenuA
GetMenuStringA
DestroyIcon
SetRect
CharUpperA
InvertRect
GetDCEx
LockWindowUpdate
IsWindowUnicode
CharNextA
DefDlgProcA
ExcludeUpdateRgn
ShowCaret
HideCaret
SetTimer
InvalidateRect
ScreenToClient
GetWindowRect
GetFocus
RemoveMenu
EnableMenuItem
GetDlgItem
GetWindowTextLengthA
GetWindowTextA
GetScrollPos
SetWindowTextA
IsWindowEnabled
IsWindow
SetFocus
MessageBoxA
WinHelpA
EnableWindow
UpdateWindow
SetDebugErrorLevel
PostMessageA
SendMessageA
IsZoomed
UnregisterClassA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comdlg32
FindTextA
GetOpenFileNameA
CommDlgExtendedError
GetFileTitleA
GetSaveFileNameA
ReplaceTextA
comctl32
ImageList_LoadImageA
ImageList_Destroy
ord17
ImageList_Draw
shell32
ShellExecuteA
SHGetSpecialFolderLocation
SHGetMalloc
ShellExecuteExA
SHBrowseForFolderA
DragFinish
DragQueryFileA
DragAcceptFiles
ExtractIconA
SHGetFileInfoA
SHGetPathFromIDListA
Sections
.text Size: 402KB - Virtual size: 401KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 208KB - Virtual size: 212KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ