Static task
static1
Behavioral task
behavioral1
Sample
3d0ff84b821464a2b468151e4fd6b9c5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3d0ff84b821464a2b468151e4fd6b9c5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3d0ff84b821464a2b468151e4fd6b9c5_JaffaCakes118
-
Size
252KB
-
MD5
3d0ff84b821464a2b468151e4fd6b9c5
-
SHA1
0a038c79133e703edee2aecdd581ce4472f7f76b
-
SHA256
5d839506b9d35ecab16cef9d45a97fb63b76ab5aacbb1e7cf328582766fcd7ba
-
SHA512
948f67f7bf65c930848887e43ffb4bbb25396baad996a700570fa82e1190cb5c54968918ee05107493a4de1f7eff9b256a8539573d6cd716a834646546403ce1
-
SSDEEP
6144:eg9SJ3GmB+gw8quOMdwD5xTse7P+BMbA5QwEgNV0gShqlHfl:LSJWmMB6OM6VxAeD+qbA5LEgNKhCHfl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d0ff84b821464a2b468151e4fd6b9c5_JaffaCakes118
Files
-
3d0ff84b821464a2b468151e4fd6b9c5_JaffaCakes118.exe windows:4 windows x86 arch:x86
d9e532bee60319c34dd4f051b70ae406
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
htons
inet_addr
gethostname
gethostbyname
iphlpapi
GetBestInterface
GetIpAddrTable
kernel32
GetProcessHeap
TlsAlloc
InitializeCriticalSection
WaitForSingleObject
lstrcpyW
lstrlenW
GetLastError
CreateEventW
CreateMutexW
GetCurrentProcessId
FreeLibrary
GlobalAlloc
LoadLibraryW
ExpandEnvironmentStringsW
SetEvent
GetModuleHandleW
GetVersionExW
GetModuleFileNameW
ExitProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetCurrentThreadId
FatalAppExitA
HeapCreate
Sleep
GetFileAttributesW
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetCurrentThread
GetModuleHandleA
GetStartupInfoA
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
LoadLibraryA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
IsValidLocale
GetLocaleInfoW
GetVersion
GetProcAddress
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
netapi32
NetReplGetInfo
NetUseGetInfo
user32
CharNextA
GetMenuStringA
SetWindowTextA
WaitMessage
CreateDialogParamA
DialogBoxIndirectParamW
GetCapture
CreatePopupMenu
LoadBitmapA
CharNextW
SetFocus
SendMessageW
GetActiveWindow
CharLowerA
CreateWindowExW
InsertMenuItemA
GetKeyboardLayout
IsMenu
SetCursor
GetMenuItemInfoA
RegisterWindowMessageA
CharUpperW
LoadMenuA
SetCapture
CopyIcon
LoadMenuIndirectA
EmptyClipboard
SetDlgItemInt
CreateWindowExA
SetForegroundWindow
ShowWindow
DefWindowProcW
GetMenu
GetWindowRgn
TrackPopupMenu
PostQuitMessage
GetCursorPos
gdi32
GetStockObject
RemoveFontResourceW
CreateBitmap
DeleteObject
CreateFontW
CreateDIBPatternBrushPt
CreateScalableFontResourceW
Sections
.edata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.aaIrfj Size: 104KB - Virtual size: 187KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.E Size: 110KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ