Static task
static1
Behavioral task
behavioral1
Sample
3d8b3ee7d2291cf6ea28ce2b523ab4cc_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3d8b3ee7d2291cf6ea28ce2b523ab4cc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3d8b3ee7d2291cf6ea28ce2b523ab4cc_JaffaCakes118
-
Size
912KB
-
MD5
3d8b3ee7d2291cf6ea28ce2b523ab4cc
-
SHA1
635fedf0bccb66ee0df1006166ce17e3750f99fb
-
SHA256
563f00333c9f7dd2ea1cbe495729f8bbb1f0fd272bd0243e8a6a6412eb826d52
-
SHA512
1c5fdc10fc77b7362bbb3060883aa0d07a9daccf000e8eb0f1c2af7d5ef52c3cee9f2c94032bc2aefb1c2a0089305ccfe44a2c9b2fcd0b61b371c5c5a56648a9
-
SSDEEP
12288:MUHGVsd7tbE47WXtiqTutEa9B9BNmZ6hGD0f6Tk+6qGN3cXCdSz+Ea/IyDsnutgC:MAi27hEzu2axs64JISzgbsnqanJsH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d8b3ee7d2291cf6ea28ce2b523ab4cc_JaffaCakes118
Files
-
3d8b3ee7d2291cf6ea28ce2b523ab4cc_JaffaCakes118.exe windows:4 windows x86 arch:x86
cd31fc08f4f2e726c7d188a9ed97f7aa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileAttributesA
GetDateFormatA
IsValidLocale
IsBadWritePtr
LeaveCriticalSection
FreeEnvironmentStringsA
GetLargestConsoleWindowSize
GetWindowsDirectoryA
GetOEMCP
CreateNamedPipeW
VirtualQueryEx
PeekNamedPipe
CopyFileExW
GetConsoleMode
GetDriveTypeA
WritePrivateProfileStringA
GetProfileIntA
ReadConsoleOutputA
CreateDirectoryExA
SetHandleCount
_lclose
GetCommandLineW
SetCurrentDirectoryA
VirtualAlloc
ClearCommBreak
LoadResource
GetPrivateProfileStringA
DeleteCriticalSection
GetVolumeInformationW
UnhandledExceptionFilter
RemoveDirectoryW
ExitProcess
GetModuleFileNameW
GetFullPathNameA
VirtualQuery
GetTickCount
lstrcpyA
lstrcpynA
OutputDebugStringW
GlobalFlags
SetStdHandle
ReadConsoleInputW
WriteConsoleOutputW
RaiseException
EnumResourceNamesW
GetDiskFreeSpaceW
user32
GetDlgItemTextA
GetClipboardViewer
DefFrameProcW
GetUpdateRgn
CloseDesktop
OemToCharBuffW
FindWindowW
ShowScrollBar
SetCursor
EnumDisplayDevicesA
FrameRect
EnumWindowStationsW
GetScrollRange
InsertMenuW
keybd_event
DrawFrameControl
ExcludeUpdateRgn
GetWindowContextHelpId
DestroyIcon
SendMessageTimeoutA
EnumChildWindows
MessageBoxExA
GetSysColorBrush
BeginPaint
TrackMouseEvent
DeleteMenu
SetWindowWord
CreateIconIndirect
GetThreadDesktop
EndDialog
UnregisterClassA
SendMessageW
advapi32
CryptReleaseContext
GetSidSubAuthorityCount
GetServiceKeyNameW
CreatePrivateObjectSecurity
StartServiceA
CryptAcquireContextW
CryptGenKey
QueryServiceConfigW
CryptSetKeyParam
RegEnumKeyA
CryptDestroyKey
RegUnLoadKeyA
RegGetKeySecurity
CryptEncrypt
ImpersonateLoggedOnUser
DuplicateTokenEx
LogonUserA
GetSecurityDescriptorGroup
RegOpenKeyExW
ws2_32
WSAAddressToStringW
WSADuplicateSocketA
gethostname
WSALookupServiceNextW
recv
WSAConnect
WSAUnhookBlockingHook
WSAResetEvent
ioctlsocket
WSASendDisconnect
gdi32
CreateBrushIndirect
CreateMetaFileW
CreateDIBitmap
GetTextFaceW
CreateICW
GetSystemPaletteUse
CreateRectRgn
GetWinMetaFileBits
GetGlyphOutlineA
ScaleWindowExtEx
oleaut32
VariantCopy
SafeArrayGetLBound
SysStringLen
SafeArrayCreate
SysAllocStringLen
comctl32
ImageList_DrawIndirect
Sections
.text Size: 3KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 596KB - Virtual size: 596KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ