Static task
static1
Behavioral task
behavioral1
Sample
3d9eba7545e08acf3106a79218dbc8ea_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3d9eba7545e08acf3106a79218dbc8ea_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3d9eba7545e08acf3106a79218dbc8ea_JaffaCakes118
-
Size
70KB
-
MD5
3d9eba7545e08acf3106a79218dbc8ea
-
SHA1
500a8188ecb5cfd299a2569274cdf689552d52d9
-
SHA256
d5d27e1c48a5d2326410793fdb40f0aa49d54467b7d5681f863df6bed45527ba
-
SHA512
adf19731794168235548070c60161541f10330ecb97d2057c76ed0d04bfeb94abf6795fb70e0de7d84635a0e99ca6b496452667ea49a7888a2b29e00a0481880
-
SSDEEP
1536:HJp0OgmLGFYnW0AVwys5RKZQVr30VukbRP:gV+rAVE5RSggbRP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d9eba7545e08acf3106a79218dbc8ea_JaffaCakes118
Files
-
3d9eba7545e08acf3106a79218dbc8ea_JaffaCakes118.exe windows:4 windows x86 arch:x86
6bd300037de0856f07a9f18d61d24bbc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
ole32
CoTaskMemAlloc
user32
AppendMenuW
BeginPaint
CharLowerA
BeginDeferWindowPos
CharToOemA
CheckDlgButton
CharLowerBuffA
CallWindowProcA
CreateDialogIndirectParamA
CheckRadioButton
CharNextW
CharUpperBuffA
CreateWindowExA
CopyImage
CheckMenuRadioItem
CloseClipboard
CreateDialogIndirectParamW
CreateMenu
CopyRect
CreateIcon
CreateDialogParamA
DialogBoxParamA
ChildWindowFromPoint
DdeFreeStringHandle
CreateIconIndirect
DdeCreateStringHandleA
DdeUninitialize
DefFrameProcA
DdeClientTransaction
DrawTextW
DialogBoxIndirectParamA
CreatePopupMenu
DeferWindowPos
DdeInitializeA
DefMDIChildProcA
DrawTextA
DispatchMessageW
GetAsyncKeyState
EnableMenuItem
DrawIcon
DefDlgProcA
EnumWindows
EnableWindow
EmptyClipboard
EnumThreadWindows
DeleteMenu
DestroyCursor
FindWindowExA
DialogBoxIndirectParamW
GetClassLongA
ExitWindowsEx
GetClassNameW
EndDialog
GetIconInfo
GetDlgItem
EnumClipboardFormats
GetClientRect
FindWindowA
GetPropA
GetCapture
GetClipboardFormatNameA
GetCursorPos
GetLastActivePopup
GetDesktopWindow
EqualRect
GetCaretPos
GetMenuItemID
GetKeyboardState
GetDlgItemInt
GetMenuStringA
GetDlgItemTextA
GetMessageA
GetMenu
GetClassNameA
GetDoubleClickTime
GetClipboardData
GetSysColor
GetWindowLongA
GetMessagePos
GetFocus
GetSysColorBrush
GetScrollRange
GetWindowTextA
GetMenuItemInfoA
GetScrollInfo
GetMenuItemCount
GetWindowThreadProcessId
GetSystemMenu
GetDCEx
GetWindowDC
InsertMenuItemA
GetUpdateRgn
IsWindowVisible
HideCaret
GetDC
IsRectEmpty
GetScrollPos
GetWindow
IsCharAlphaA
GetWindowTextLengthA
IsChild
GetUserObjectSecurity
InvalidateRect
LoadMenuW
GetKeyboardLayoutNameA
LoadStringW
MapVirtualKeyA
GetWindowLongW
IsZoomed
MoveWindow
GetWindowRect
IsWindowEnabled
LoadImageW
LoadImageA
LoadStringA
IntersectRect
RegisterClassExA
LoadBitmapA
MessageBoxA
RegisterWindowMessageA
RemoveMenu
PeekMessageW
IsClipboardFormatAvailable
LoadAcceleratorsA
RegisterClipboardFormatA
mouse_event
ReleaseDC
GetTopWindow
OffsetRect
ToAscii
OemToCharA
RedrawWindow
LockWindowUpdate
ScrollWindow
ShowScrollBar
UnregisterHotKey
SetCapture
PtInRect
SetScrollPos
ScreenToClient
ScrollDC
IsCharAlphaNumericA
PostMessageA
ModifyMenuA
RegisterHotKey
WinHelpA
SetScrollInfo
wsprintfA
SetMenuItemInfoA
MessageBoxW
ValidateRect
TranslateMDISysAccel
MsgWaitForMultipleObjects
RemovePropA
SetParent
SubtractRect
SetCursorPos
SetWindowsHookExA
SetCursor
RegisterClassA
ShowCursor
ShowCaret
SendDlgItemMessageA
SendDlgItemMessageW
SetWindowPlacement
SetWindowLongA
OpenClipboard
SetMenu
SetClassLongA
TrackPopupMenu
ShowWindowAsync
SetKeyboardState
SystemParametersInfoW
TranslateMessage
TrackPopupMenuEx
SetDlgItemInt
ToUnicode
WindowFromPoint
SetScrollRange
WaitMessage
TranslateAcceleratorA
SetWindowRgn
SetMenuItemBitmaps
ShowWindow
SetDlgItemTextW
SetUserObjectSecurity
ShowOwnedPopups
WaitForInputIdle
SetWindowTextA
advapi32
RegQueryInfoKeyA
version
VerQueryValueA
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 88KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE