Static task
static1
Behavioral task
behavioral1
Sample
3d76558f1474c45ad11b341c58e7ac53_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3d76558f1474c45ad11b341c58e7ac53_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3d76558f1474c45ad11b341c58e7ac53_JaffaCakes118
-
Size
280KB
-
MD5
3d76558f1474c45ad11b341c58e7ac53
-
SHA1
a63d52c396f1d0196103aaaf62b9804af94a6546
-
SHA256
1aa51954e0fce995a4e660ffd86177a3f0b16c7820dac1a30591893290f612ca
-
SHA512
590346f47e12c14986edbc85e0c3a6aae06d20b606440e5914cdc8947de6f9f6f57c563c7a8019212ca0824c0d7ed46d73357881ff7785a0d4c67ac6d458f820
-
SSDEEP
3072:twIK6Mb9QY9wRY8kNHBC4jU6bqYwn9lTmU49koDvjvAPhNjlPIoz2z6wSb43rknJ:twTpR9ovkVfUSq33TmYIvz7XGQOJH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d76558f1474c45ad11b341c58e7ac53_JaffaCakes118
Files
-
3d76558f1474c45ad11b341c58e7ac53_JaffaCakes118.exe windows:4 windows x86 arch:x86
a55f58724ec18fa3eebf10312a83b1ed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetFileAttributesA
Process32Next
Module32Next
GetFileAttributesExA
Module32First
Process32First
CreateToolhelp32Snapshot
FreeResource
SizeofResource
LockResource
WritePrivateProfileStringA
GetTempFileNameA
LoadResource
FindResourceA
LoadLibraryW
GetLastError
LocalFree
LocalAlloc
CreateFileW
DeleteFileA
GetCurrentDirectoryA
SetCurrentDirectoryA
InterlockedIncrement
CreateEventA
GetWindowsDirectoryA
CreateFileA
ReadFile
WriteFile
GetProcAddress
MoveFileExA
SetFileAttributesA
GetTickCount
CreateProcessA
CloseHandle
lstrlenA
GetTempPathA
GetCurrentProcess
FlushInstructionCache
InitializeCriticalSection
DeleteCriticalSection
HeapDestroy
GetModuleHandleA
SetUnhandledExceptionFilter
GetCommandLineA
InterlockedDecrement
EnterCriticalSection
GetCurrentThreadId
GetStartupInfoA
VirtualProtect
SetLastError
DeviceIoControl
ExpandEnvironmentStringsA
GetLongPathNameW
lstrlenW
GetLongPathNameA
CopyFileA
CreateDirectoryA
GetVolumeInformationA
CreateFileMappingA
OutputDebugStringA
DebugBreak
WaitForSingleObject
GetModuleFileNameA
SetEvent
MapViewOfFile
UnmapViewOfFile
GetLogicalDrives
GetDriveTypeA
LoadLibraryExW
MultiByteToWideChar
LeaveCriticalSection
FindClose
FindFirstFileA
GetShortPathNameA
MoveFileA
FindNextFileA
RemoveDirectoryA
OpenProcess
HeapFree
HeapAlloc
GetProcessHeap
FreeLibrary
TerminateProcess
WideCharToMultiByte
ReadProcessMemory
lstrcmpiA
GetSystemDirectoryA
SetFilePointer
GetFileSize
SearchPathW
Sleep
DuplicateHandle
GetPrivateProfileIntA
GetPrivateProfileStringA
CreateThread
GetCurrentProcessId
GetVersionExA
GetEnvironmentVariableA
user32
LoadStringA
CreateDialogParamA
ShowWindow
PeekMessageA
GetMessageA
TranslateMessage
MessageBoxA
GetActiveWindow
DestroyWindow
IsDialogMessageA
SetWindowLongA
GetWindowTextLengthA
DispatchMessageA
CharNextA
wvsprintfA
EndDialog
SetDlgItemTextA
DialogBoxParamA
PostMessageA
BeginPaint
ScreenToClient
DrawTextA
EndPaint
PostQuitMessage
GetWindowLongA
GetWindowThreadProcessId
FindWindowA
FindWindowExA
GetParent
GetWindow
GetWindowRect
SystemParametersInfoA
GetClientRect
MapWindowPoints
SetWindowPos
GetSystemMetrics
LoadImageA
SendMessageA
SetWindowTextA
GetDlgItem
EnableWindow
DefWindowProcA
gdi32
SelectObject
SetBkMode
SetTextColor
GetStockObject
shell32
ShellExecuteA
SHGetSpecialFolderPathA
CommandLineToArgvW
SHGetFolderPathA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
comctl32
InitCommonControlsEx
msvcrt
_mbscmp
_mbstok
_mbsicmp
_mbslwr
tolower
_CxxThrowException
_mbschr
_mbsnbicmp
sscanf
mbstowcs
_stricmp
_mbsnbcpy
malloc
memcpy
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__dllonexit
_onexit
??1type_info@@UAE@XZ
_controlfp
_strlwr
fputs
strrchr
_vsnprintf
fopen
rewind
fgets
_strnicmp
fseek
fprintf
fclose
_osver
_except_handler3
_snprintf
atoi
_ismbcdigit
wcslen
_beginthread
_purecall
_mbsrchr
sprintf
strstr
??2@YAPAXI@Z
memmove
realloc
setlocale
_mbsstr
free
__CxxFrameHandler
_mbsnbcmp
shlwapi
SHGetValueA
PathFileExistsA
PathCombineA
StrStrIA
SHDeleteKeyA
wnsprintfA
StrChrW
StrStrIW
SHSetValueA
SHDeleteValueA
PathAppendA
PathIsDirectoryA
StrCmpNIA
urlmon
URLDownloadToFileA
wininet
HttpOpenRequestA
InternetCloseHandle
HttpSendRequestA
InternetOpenA
InternetConnectA
psapi
GetModuleInformation
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
advapi32
SetNamedSecurityInfoA
RegCloseKey
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseServiceHandle
ControlService
ChangeServiceConfigA
OpenServiceA
OpenSCManagerA
RegEnumValueA
RegQueryValueExA
SetEntriesInAclA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
RegDeleteValueA
RegEnumKeyExA
RegCreateKeyExA
RegEnumKeyA
DeleteAce
GetExplicitEntriesFromAclA
GetUserNameA
Sections
.text Size: 84KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 156KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ