Static task
static1
Behavioral task
behavioral1
Sample
3cb8f98d8d4bd59583f78b81cc8a23d6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3cb8f98d8d4bd59583f78b81cc8a23d6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3cb8f98d8d4bd59583f78b81cc8a23d6_JaffaCakes118
-
Size
336KB
-
MD5
3cb8f98d8d4bd59583f78b81cc8a23d6
-
SHA1
301a4fc151d1ae61ed6173ca70434f4c9e4ec21d
-
SHA256
bad2e6c161df964b53e8fa6b96fd762445244ea70a52e51c0c6a51b9864f13eb
-
SHA512
4d4411029e23e903761ae92641478ceba062736e470a245e6da5bd51079e67f7cf08cd0032ec16fe79e88b6347d1c3a78405bd52972e0c1b064faae361de8f11
-
SSDEEP
6144:/Vb4syY+ZotJ3jYhmk+m4s1OmI/Qr+1IMZ+OCbA1:lGW/jPr4r6fc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3cb8f98d8d4bd59583f78b81cc8a23d6_JaffaCakes118
Files
-
3cb8f98d8d4bd59583f78b81cc8a23d6_JaffaCakes118.exe windows:4 windows x86 arch:x86
f533a113541cde40fd33414f313e750e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleOutputW
lstrcpyA
VirtualFree
GetLongPathNameA
FindNextChangeNotification
SuspendThread
FindResourceExW
GetTapeStatus
GetPrivateProfileSectionW
GetSystemTimeAsFileTime
SetConsoleMode
SetThreadAffinityMask
LoadResource
WritePrivateProfileSectionW
WritePrivateProfileStringA
SetFileAttributesA
GetFileType
GetCurrentProcessId
CreateEventA
_hread
Beep
GetShortPathNameA
SetStdHandle
_llseek
GenerateConsoleCtrlEvent
ReleaseSemaphore
GetBinaryTypeA
FlushConsoleInputBuffer
ClearCommBreak
IsDBCSLeadByteEx
FindFirstFileA
AreFileApisANSI
ReadFile
GetCPInfo
SwitchToFiber
SetConsoleWindowInfo
CreateDirectoryExA
PeekNamedPipe
SetupComm
GlobalAddAtomW
GetTickCount
GetCurrentProcess
_lread
GetFileAttributesExA
TlsGetValue
GetOverlappedResult
GetFullPathNameA
CopyFileExW
VirtualQuery
SetVolumeLabelA
GetTempPathW
DuplicateHandle
SetThreadPriorityBoost
GetACP
MultiByteToWideChar
SetSystemTime
WritePrivateProfileStringW
FreeLibraryAndExitThread
ReadConsoleA
GetCommConfig
GetProfileStringA
PeekConsoleInputW
GetDiskFreeSpaceExA
GlobalReAlloc
FindResourceExA
CompareStringW
InitializeCriticalSection
ReadFileScatter
GetCommState
ReadDirectoryChangesW
LeaveCriticalSection
FileTimeToLocalFileTime
RemoveDirectoryA
ExitProcess
FillConsoleOutputCharacterA
SetThreadLocale
EnumTimeFormatsW
PrepareTape
WriteConsoleOutputCharacterA
SetConsoleCursorPosition
GetWindowsDirectoryA
VirtualProtect
GetVersionExA
WriteFile
GetCommModemStatus
lstrcpynA
PulseEvent
RemoveDirectoryW
GetCurrentDirectoryW
LocalSize
SetCommTimeouts
GetCommandLineA
user32
UnregisterClassW
GetDlgItemInt
CharNextA
IsZoomed
GetNextDlgGroupItem
CopyIcon
EnableMenuItem
IsCharUpperW
CreateAcceleratorTableW
GetSubMenu
DestroyIcon
GetScrollBarInfo
SendNotifyMessageW
SetWindowWord
GetPropA
DispatchMessageA
CreateDesktopA
GetClipboardViewer
EnumDisplayDevicesW
InsertMenuA
GetClipboardSequenceNumber
RegisterClassExW
IsRectEmpty
SetPropA
CopyAcceleratorTableA
UnionRect
WaitMessage
ShowOwnedPopups
GetKeyboardState
CallNextHookEx
ValidateRgn
LoadIconW
CreateDialogParamW
GetWindowInfo
GetDlgItem
gdi32
PolyPolyline
comdlg32
PageSetupDlgA
ChooseFontA
advapi32
SetThreadToken
DestroyPrivateObjectSecurity
GetNamedSecurityInfoW
CreateServiceW
ImpersonateSelf
CryptImportKey
shell32
ExtractIconA
SHGetSpecialFolderPathA
DragAcceptFiles
SHLoadInProc
SHGetSpecialFolderLocation
ole32
OleRegGetMiscStatus
CoGetClassObject
ReadClassStm
OleSetClipboard
CoMarshalInterThreadInterfaceInStream
CoGetTreatAsClass
CoCreateInstanceEx
OleSaveToStream
OleSetMenuDescriptor
CoDisconnectObject
oleaut32
VariantCopy
SysAllocStringLen
QueryPathOfRegTypeLi
LoadTypeLi
VariantChangeType
SafeArrayPutElement
shlwapi
PathCombineA
StrFormatKBSizeW
setupapi
SetupGetStringFieldA
SetupDiGetDeviceInterfaceDetailW
SetupDiSetSelectedDriverW
SetupDiSetSelectedDevice
SetupDiGetClassDevsExW
SetupDiCreateDeviceInfoA
SetupDiEnumDriverInfoW
SetupLogErrorA
SetupInstallServicesFromInfSectionA
SetupDiBuildDriverInfoList
Sections
isucga Size: 288KB - Virtual size: 287KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
agsykoy Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
qsiaamq Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
euaomwi Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ