Static task
static1
Behavioral task
behavioral1
Sample
3cd0339a66e0c60646e226dfa4e41238_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3cd0339a66e0c60646e226dfa4e41238_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3cd0339a66e0c60646e226dfa4e41238_JaffaCakes118
-
Size
114KB
-
MD5
3cd0339a66e0c60646e226dfa4e41238
-
SHA1
02fd68dcf4d66ac058226b147206785a11ce042c
-
SHA256
d985dad21d57b0824b6e57b2c47a5f810cbb2acf0f022842deb830ecec4540f9
-
SHA512
8cfbd493f4a524423464819c94b8ab1df896500a106c43541c75808b5ea9d51f306671844264c5058532ee143aa206b09ac964e2cb8c39d6dbdd5f0ab1a5d21a
-
SSDEEP
3072:kce+P8iSNmBoqIeJvB15FwEdVoepSLlTT:7H7um3HJvsSjAL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3cd0339a66e0c60646e226dfa4e41238_JaffaCakes118
Files
-
3cd0339a66e0c60646e226dfa4e41238_JaffaCakes118.exe windows:4 windows x86 arch:x86
009c2365e8cb30d4b7acce8dd7eee9cb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetSaveFileNameA
FindTextA
GetOpenFileNameA
GetFileTitleA
ChooseColorA
shell32
Shell_NotifyIconA
comctl32
ImageList_Write
ImageList_Create
msvcrt
pow
memmove
strcmp
oleaut32
GetErrorInfo
RegisterTypeLib
SysStringLen
SafeArrayUnaccessData
SysFreeString
OleLoadPicture
SysReAllocStringLen
SafeArrayGetUBound
user32
TrackPopupMenu
SetActiveWindow
PtInRect
GetWindowTextA
CharUpperBuffA
GetSysColorBrush
PostMessageA
IsWindowEnabled
GetClassInfoA
SystemParametersInfoA
GetScrollPos
IntersectRect
GetCapture
SetWindowsHookExA
ShowOwnedPopups
UnregisterClassA
EnableMenuItem
KillTimer
DestroyWindow
DefMDIChildProcA
ChildWindowFromPoint
PostQuitMessage
GetWindowLongW
DrawEdge
SetWindowTextA
SetCapture
CallWindowProcA
GetCursor
InsertMenuA
GetMenuStringA
DrawAnimatedRects
GetDC
ShowScrollBar
MapVirtualKeyA
GetClipboardData
SetFocus
CloseClipboard
GetKeyboardLayout
GetKeyState
InvalidateRect
GetDlgItem
OemToCharA
FindWindowA
DispatchMessageW
LoadKeyboardLayoutA
IsWindowUnicode
EnableWindow
GetDCEx
GetMenuItemInfoA
DrawFrameControl
RemoveMenu
CharLowerBuffA
IsWindow
SetClipboardData
GetSysColor
DrawIconEx
GetKeyboardState
IsIconic
GetWindowPlacement
GetLastActivePopup
GetMenuState
ClientToScreen
IsRectEmpty
GetKeyNameTextA
EndPaint
SetWindowLongA
LoadCursorA
LoadIconA
SetWindowPos
LoadBitmapA
SendMessageW
GetTopWindow
GetSystemMetrics
CharLowerA
GetKeyboardType
GetSystemMenu
AdjustWindowRectEx
DrawTextA
SetScrollInfo
DestroyCursor
wsprintfA
GetMenuItemID
GetFocus
GetWindowLongA
WaitMessage
CheckMenuItem
GetWindowDC
RemovePropA
RegisterClipboardFormatA
DefWindowProcA
DrawMenuBar
OffsetRect
DestroyIcon
SetPropA
EqualRect
ShowWindow
RegisterWindowMessageA
SetWindowPlacement
MoveWindow
SetCursor
SetMenuItemInfoA
IsChild
IsWindowVisible
GetPropA
SetRect
SetScrollRange
CreateMenu
SetParent
EnumThreadWindows
SetTimer
TranslateMessage
EnumChildWindows
GetScrollInfo
UnhookWindowsHookEx
SetMenu
GetMenu
ScrollWindow
DrawIcon
GetWindowThreadProcessId
SetForegroundWindow
IsZoomed
EmptyClipboard
GetIconInfo
LoadStringA
MapWindowPoints
IsDialogMessageW
IsDialogMessageA
SetScrollPos
GetWindowRect
OpenClipboard
FillRect
GetMessagePos
MessageBeep
GetSubMenu
InflateRect
GetClassNameA
DestroyMenu
CallNextHookEx
DispatchMessageA
DefFrameProcA
EnableScrollBar
BeginPaint
CharNextA
GetForegroundWindow
SetWindowLongW
GetKeyboardLayoutNameA
SendMessageA
CreateWindowExA
GetClassLongA
ScreenToClient
RegisterClassA
InsertMenuItemA
CharNextW
MessageBoxA
GetScrollRange
TranslateMDISysAccel
GetClientRect
GetActiveWindow
RedrawWindow
shlwapi
PathIsContentTypeA
SHStrDupA
PathFileExistsA
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
SHQueryInfoKeyA
SHQueryValueExA
ole32
StgCreateDocfileOnILockBytes
CreateBindCtx
WriteClassStm
GetHGlobalFromStream
CoUnmarshalInterface
StringFromIID
PropVariantClear
version
GetFileVersionInfoSizeA
kernel32
GetModuleHandleA
LoadLibraryA
ExitProcess
GetVersionExA
FreeResource
VirtualAllocEx
ExitThread
HeapDestroy
LoadLibraryExA
lstrlenA
Sections
CODE Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 579B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE