Static task
static1
Behavioral task
behavioral1
Sample
3cf7804f7a9a8e7b6784aa787d01ab8e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3cf7804f7a9a8e7b6784aa787d01ab8e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3cf7804f7a9a8e7b6784aa787d01ab8e_JaffaCakes118
-
Size
692KB
-
MD5
3cf7804f7a9a8e7b6784aa787d01ab8e
-
SHA1
df17938d505b5ced01a8d57f8646766af62cc838
-
SHA256
88ddca1a954539ed41a4b03b8449145ebc5c6c99a21f17975d60dea9976017f5
-
SHA512
eeb5fbd87e5c59f245bbf74af519fa5bf9c0a250e1bb67a9e52c05824b96210feaf8a67d2dcc28e50c3b4eb49383279139557b366e32c39cb025413262c2d771
-
SSDEEP
12288:n5Yjoa4C6gI81Y6jgEtxDSDIe6QYz/2CacywXE76bqXvkr:nOjogm81hjgsSDI+o/o3wXW6bRr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3cf7804f7a9a8e7b6784aa787d01ab8e_JaffaCakes118
Files
-
3cf7804f7a9a8e7b6784aa787d01ab8e_JaffaCakes118.exe windows:4 windows x86 arch:x86
4f865991dbcc7591323e7adb27b1f428
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetOpenUrlA
InternetDialW
LoadUrlCacheContent
GetUrlCacheGroupAttributeW
InternetSetOptionA
comdlg32
PrintDlgW
GetOpenFileNameW
GetFileTitleW
kernel32
SetLastError
QueryPerformanceCounter
CreateMutexA
HeapAlloc
CreateFileW
GetStringTypeW
ExitProcess
SetStdHandle
GetDiskFreeSpaceA
GetModuleFileNameA
DeleteCriticalSection
OpenFileMappingW
LeaveCriticalSection
GetStdHandle
GetCurrentThread
GetCompressedFileSizeW
GetDiskFreeSpaceW
RemoveDirectoryW
EnumResourceNamesW
GetOEMCP
GlobalReAlloc
GetSystemDefaultLCID
EnumTimeFormatsW
GetFileType
VirtualQuery
WaitForMultipleObjectsEx
GetVersion
GetEnvironmentStringsW
GetCurrentThreadId
IsBadWritePtr
RtlUnwind
ExpandEnvironmentStringsA
FindResourceA
GetThreadTimes
SetEnvironmentVariableA
GetLocalTime
HeapDestroy
WideCharToMultiByte
SetThreadLocale
CreateDirectoryExW
VirtualAlloc
GetCurrencyFormatW
FreeEnvironmentStringsW
EnterCriticalSection
GetSystemDirectoryA
TlsFree
GetNumberFormatW
GetModuleHandleA
GetFullPathNameW
FillConsoleOutputAttribute
SetLocaleInfoW
OpenSemaphoreA
MultiByteToWideChar
OpenMutexA
FreeEnvironmentStringsA
GetProcAddress
HeapCreate
GetProcessHeap
SetFilePointer
OpenProcess
CreateEventA
GetCommandLineW
GetShortPathNameA
IsBadReadPtr
UnlockFileEx
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetCommandLineA
SetHandleCount
GetConsoleScreenBufferInfo
CreateWaitableTimerW
HeapReAlloc
SuspendThread
GetStartupInfoA
GetDiskFreeSpaceExW
CompareStringW
GetPrivateProfileStructW
FindFirstFileA
LCMapStringW
CopyFileA
TlsGetValue
lstrcmp
GetLastError
InterlockedIncrement
HeapFree
SystemTimeToFileTime
GetSystemTime
GetEnvironmentStrings
CloseHandle
DebugActiveProcess
GlobalFindAtomW
GetConsoleTitleW
VirtualFree
LoadLibraryA
ReadFile
WritePrivateProfileStructW
TlsAlloc
SetThreadContext
GetPrivateProfileStringW
WriteFile
TerminateProcess
FindFirstFileW
InterlockedExchange
SetVolumeLabelW
InitializeCriticalSection
GetCurrentProcessId
GetCurrentProcess
GetCurrentDirectoryA
GetFileSize
CreateProcessW
GlobalAddAtomW
GetFileTime
GetStringTypeA
TlsSetValue
InterlockedDecrement
FreeLibraryAndExitThread
lstrcmpiW
GetCPInfo
CompareStringA
FreeLibrary
SetConsoleTitleA
FoldStringW
LCMapStringA
FlushFileBuffers
LocalLock
GetConsoleMode
GetTickCount
GetACP
FileTimeToLocalFileTime
OpenWaitableTimerA
UnhandledExceptionFilter
user32
GetNextDlgGroupItem
ShowWindowAsync
SetCursor
UnloadKeyboardLayout
GetScrollPos
TabbedTextOutW
SetClipboardViewer
EditWndProc
DlgDirSelectExA
SetCursorPos
DrawStateA
CharPrevW
CreateMDIWindowA
IsDialogMessageA
MessageBoxW
SetThreadDesktop
DestroyMenu
InsertMenuItemW
CharUpperA
DestroyWindow
TrackPopupMenuEx
GetDesktopWindow
IsWindowVisible
GetDlgCtrlID
EnumDisplayDevicesW
InvalidateRect
PaintDesktop
DdeGetData
CopyAcceleratorTableA
DdeFreeDataHandle
VkKeyScanExA
SetSysColors
GetMessageTime
CreateWindowExW
SetWindowRgn
CharLowerBuffA
ReleaseDC
RemoveMenu
DlgDirListA
EnumDisplaySettingsA
ShowWindow
ShowCursor
CallNextHookEx
SendIMEMessageExA
DefWindowProcA
ChangeDisplaySettingsA
SetProcessWindowStation
GetMenu
GetScrollInfo
RegisterClassA
DragDetect
DdeReconnect
RegisterClassExW
SetMenuItemInfoW
GrayStringA
DdeInitializeW
GetClassNameW
DdeInitializeA
wsprintfW
EnumWindowStationsA
EnableWindow
LoadStringA
GetKeyboardLayoutList
MsgWaitForMultipleObjects
GetUpdateRgn
RegisterClassExA
MapVirtualKeyExW
DdeCmpStringHandles
CallWindowProcA
GetQueueStatus
TrackMouseEvent
comctl32
ImageList_Merge
InitCommonControlsEx
ImageList_SetBkColor
CreateStatusWindowA
shell32
SHGetDesktopFolder
SHInvokePrinterCommandW
DragAcceptFiles
DoEnvironmentSubstW
SHFileOperationA
gdi32
GetAspectRatioFilterEx
GdiGetBatchLimit
CopyEnhMetaFileW
CombineTransform
GetObjectA
GetWorldTransform
GetColorAdjustment
GetTextFaceA
DeleteDC
GetClipRgn
PolyBezier
CreateDCA
GetCharWidth32A
GetDeviceCaps
DeleteObject
SetWindowOrgEx
Sections
.text Size: 260KB - Virtual size: 256KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 248KB - Virtual size: 246KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ