Static task
static1
Behavioral task
behavioral1
Sample
3d4312e46700b4f1f685c3b625ba4c83_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3d4312e46700b4f1f685c3b625ba4c83_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3d4312e46700b4f1f685c3b625ba4c83_JaffaCakes118
-
Size
252KB
-
MD5
3d4312e46700b4f1f685c3b625ba4c83
-
SHA1
010d03b67a3014b5a7db0213ddbd02542a69c6f3
-
SHA256
ec3664b60272821b2b55e05ee97eac1170417517ff850131878a8436bd03d4cb
-
SHA512
f8f9e26c23b81e3673c93132a15031aba0f87f98f3168651a069084a0a7e2d1b30e9c9c4648b7c2908d272d54da24a1487ef5f4d486274030d4994c1469ef619
-
SSDEEP
6144:PEzbO3IXOrryb1NIuKKBc3rwDbgA4a43ewT/342Vc5qQoeG:PEWyO31u9u3cbWasT3NR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d4312e46700b4f1f685c3b625ba4c83_JaffaCakes118
Files
-
3d4312e46700b4f1f685c3b625ba4c83_JaffaCakes118.exe windows:4 windows x86 arch:x86
2ee18494c3c3de6541f28a1421b5af9b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteProcessMemory
Beep
GetEnvironmentStringsW
ReleaseMutex
MoveFileExA
lstrcmpA
GetFullPathNameA
CreateFileW
WriteConsoleOutputCharacterA
LocalFileTimeToFileTime
LoadLibraryExA
SetSystemTime
PurgeComm
GetCommandLineW
VirtualUnlock
FindResourceExA
_lopen
GetTickCount
DeleteCriticalSection
GetVolumeInformationW
EnumTimeFormatsW
GetPrivateProfileStringW
VirtualLock
VirtualAllocEx
SetCommMask
GetModuleHandleA
CreateMutexW
ExitThread
ReadConsoleInputW
IsDBCSLeadByteEx
DebugBreak
GetTapeParameters
GetProfileStringA
EnumSystemCodePagesW
ReadFileScatter
GetSystemDefaultLangID
GetPrivateProfileSectionW
OutputDebugStringW
SetFileTime
SetThreadLocale
CreateProcessA
ConnectNamedPipe
EnumCalendarInfoW
SwitchToFiber
GlobalFindAtomW
FreeLibrary
FileTimeToLocalFileTime
GetOEMCP
VirtualProtect
GetVersionExA
GetCommandLineA
GetStartupInfoA
WritePrivateProfileStringW
CreateDirectoryExA
GlobalAddAtomW
OutputDebugStringA
WriteFile
VirtualQueryEx
GlobalUnlock
LocalSize
GetLargestConsoleWindowSize
WritePrivateProfileStructA
CreateDirectoryW
GetUserDefaultLangID
GetConsoleCursorInfo
GetProfileIntA
ClearCommBreak
GlobalDeleteAtom
EnumResourceLanguagesW
GetNumberFormatW
SearchPathW
GetCommModemStatus
VirtualAlloc
GetBinaryTypeW
ExitProcess
user32
SetRect
DrawAnimatedRects
EnumDesktopsW
MonitorFromPoint
GetMessageTime
DestroyWindow
GetMenuItemCount
MapVirtualKeyW
LoadCursorW
SetRectEmpty
ScrollWindow
CharNextA
MonitorFromWindow
SetClipboardViewer
GetWindow
PostThreadMessageW
OpenDesktopA
SetMenuInfo
HideCaret
MessageBeep
GetDlgItemTextW
CreateDialogParamA
EndMenu
GetUpdateRgn
GetForegroundWindow
EnumWindowStationsA
LoadAcceleratorsW
ScreenToClient
OpenIcon
CharToOemW
ValidateRgn
ChildWindowFromPoint
wvsprintfW
CharLowerBuffW
MessageBoxExA
InflateRect
EnumDisplayDevicesW
PtInRect
CloseWindow
DefWindowProcA
CreateDialogIndirectParamA
CallNextHookEx
PostMessageW
CharUpperBuffA
EndDeferWindowPos
GetAsyncKeyState
SetClassLongA
LoadMenuIndirectA
RemoveMenu
FrameRect
GetTopWindow
gdi32
GetPaletteEntries
GetCharacterPlacementW
GetTextColor
CreateRectRgnIndirect
SetPaletteEntries
GdiFlush
Rectangle
CreatePalette
SetSystemPaletteUse
GetFontData
CombineRgn
CreatePolygonRgn
CreateFontIndirectW
SetDIBColorTable
SetWindowOrgEx
SelectClipRgn
CloseEnhMetaFile
comdlg32
ChooseFontA
ReplaceTextW
GetOpenFileNameW
advapi32
GetSecurityDescriptorControl
AddAccessAllowedAce
shell32
SHGetSettings
SHGetSpecialFolderLocation
ole32
OleRegGetMiscStatus
CoFreeUnusedLibraries
oleaut32
SysStringLen
VariantCopy
SafeArrayPutElement
SafeArrayCreate
SafeArrayGetLBound
SysFreeString
SetErrorInfo
VariantChangeType
comctl32
ImageList_Add
ImageList_DragEnter
shlwapi
PathUnquoteSpacesW
UrlGetPartA
PathStripPathW
StrCmpIW
AssocQueryKeyW
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 232KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE