Static task
static1
Behavioral task
behavioral1
Sample
3c6687aaa25d8b6b0b289e6b37885e23_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3c6687aaa25d8b6b0b289e6b37885e23_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3c6687aaa25d8b6b0b289e6b37885e23_JaffaCakes118
-
Size
156KB
-
MD5
3c6687aaa25d8b6b0b289e6b37885e23
-
SHA1
f7cf1f9bdec9f6685cbbccf2cf1710915db020c9
-
SHA256
4b05431946a550d164a1ef630e908f23181e86f91de5208f2dcc55b7d99754d7
-
SHA512
9cb4638609903664d557a782eb6ceb58db248a1b2800fdf1a33e3abe47581253600165a3c357ea3712d76536446971b15886aa0f50e36989c1725ec71c9611c7
-
SSDEEP
3072:IHdwfbZM+ZzWiiopgEr3EQMalS76CJQKZau5Pp2Hq:MdQbe+Aou83dZlS7fauBz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c6687aaa25d8b6b0b289e6b37885e23_JaffaCakes118
Files
-
3c6687aaa25d8b6b0b289e6b37885e23_JaffaCakes118.exe windows:4 windows x86 arch:x86
6faf884f65506f11bd42b38d98082c01
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
zspool
RegEnumKeyA
GetPrinterDriverA
EnumPrintersA
EnumPrintProcessorsA
DeletePrintProcessorA
DeleteMonitorA
RegDeleteKeyA
EnumPrinterDriversA
DeletePrinterDriverA
EnumJobsA
SetJobA
DeletePrinter
RegDeleteValueA
DeletePrinterConnectionA
RegEnumValueA
GetPrinterDataA
RegOpenKeyA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
GetPrinterDriverDirectoryA
GetPrintProcessorDirectoryA
OpenPrinterA
GetPrinterA
SetPrinterA
ClosePrinter
kernel32
SearchPathA
lstrlenA
GetCurrentDirectoryA
GetTempFileNameA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetModuleFileNameA
GetVersionExA
GlobalMemoryStatus
lstrcpyA
CloseHandle
CreateFileA
lstrcatA
CreateDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
ReadFile
GetFileSize
WriteFile
SetCurrentDirectoryA
MultiByteToWideChar
SetEndOfFile
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteProfileStringA
GetProfileStringA
lstrcmpiA
WideCharToMultiByte
GetOEMCP
GetCommandLineA
CreateProcessA
GetCurrentProcess
Sleep
WinExec
GetExitCodeProcess
RemoveDirectoryA
MoveFileExA
DeleteFileA
FindClose
FindNextFileA
FindFirstFileA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
VirtualAlloc
GetStringTypeA
GetStartupInfoA
GetStringTypeW
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapSize
UnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetComputerNameA
FreeEnvironmentStringsA
GetLastError
SetFilePointer
lstrcpynA
GetVersion
TerminateProcess
ExitProcess
GetACP
GetModuleHandleA
RaiseException
RtlUnwind
HeapFree
SetUnhandledExceptionFilter
HeapAlloc
GetCPInfo
user32
EnableMenuItem
CreateDialogParamA
GetDlgCtrlID
GetParent
ExitWindowsEx
RedrawWindow
CharLowerA
SendMessageTimeoutA
LoadStringA
CharNextA
AppendMenuA
GetSystemMenu
GetMessagePos
SetMenuDefaultItem
CheckMenuItem
DeleteMenu
GetSubMenu
LoadMenuA
MessageBoxA
SetTimer
LoadCursorA
ShowWindow
SetFocus
TrackPopupMenu
DialogBoxParamA
DdeInitializeA
DdeCreateStringHandleA
GetClassInfoA
RegisterClassA
BringWindowToTop
SetForegroundWindow
DdeConnect
DdeClientTransaction
DdeDisconnect
ScreenToClient
GetDC
LoadBitmapA
FillRect
ReleaseDC
LoadIconA
SetWindowTextA
GetDesktopWindow
GetWindowRect
SetWindowPos
GetWindowLongA
GetDlgItem
wsprintfA
SendMessageA
EndDialog
SetWindowLongA
IsDlgButtonChecked
FindWindowA
RegisterWindowMessageA
PostMessageA
EnableWindow
SetCursor
KillTimer
CheckRadioButton
MoveWindow
SendDlgItemMessageA
gdi32
DeleteObject
SelectObject
CreateCompatibleDC
GetStockObject
CreateFontIndirectA
GetObjectA
DeleteDC
BitBlt
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
comctl32
ImageList_Draw
ord17
ImageList_LoadImageA
ImageList_Destroy
advapi32
OpenProcessToken
CloseServiceHandle
ControlService
RegQueryValueA
StartServiceA
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
AdjustTokenPrivileges
DeleteService
OpenServiceA
OpenSCManagerA
LookupPrivilegeValueA
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
Sections
.text Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE