Static task
static1
Behavioral task
behavioral1
Sample
3db9bb68291b2ac43ef9efe25d32b3d2_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3db9bb68291b2ac43ef9efe25d32b3d2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3db9bb68291b2ac43ef9efe25d32b3d2_JaffaCakes118
-
Size
320KB
-
MD5
3db9bb68291b2ac43ef9efe25d32b3d2
-
SHA1
12d4f4a52483fb90631c927df8f1b913f282b513
-
SHA256
776dd64018d609810e0f7274d3b050582efd2de83ec5543eb4797e1f551f4e93
-
SHA512
543f7aa4e81b637f40811f712189b35cd7828acff14dcf81546a615fd25b1e131aa39caea027d05391bdc4b9c1dc8132ebc6375af8c2c18a50fb9cbd8a446204
-
SSDEEP
6144:I/P+k1ZolA/V+HHDRDrQwAYoMo2jMoKt3P+Hp1AXlHBVO6NCYj4tyYhdF:IVZl/V8HDRgwAYNo2MoKt38W1hVJj4tr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3db9bb68291b2ac43ef9efe25d32b3d2_JaffaCakes118
Files
-
3db9bb68291b2ac43ef9efe25d32b3d2_JaffaCakes118.exe windows:4 windows x86 arch:x86
ee6b3de59c3518a4e18cb569b0b89b2a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetOverlappedResult
GetTapeParameters
GlobalMemoryStatus
SetStdHandle
GlobalGetAtomNameA
TerminateThread
GetVolumeInformationA
IsValidCodePage
CallNamedPipeA
GetFileType
GetVersionExA
GetModuleHandleA
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
GetCommProperties
lstrcpynA
GetEnvironmentVariableW
HeapCreate
SetThreadPriorityBoost
GetCurrentThread
LocalUnlock
GetProcessAffinityMask
FindResourceExW
DeleteFileA
OpenFile
FreeEnvironmentStringsW
CreateNamedPipeW
SetFilePointer
GetAtomNameA
GetUserDefaultLangID
GetCompressedFileSizeW
ReleaseSemaphore
CreateDirectoryW
SwitchToThread
GlobalFree
OpenFileMappingW
DebugBreak
GetThreadLocale
SetConsoleCtrlHandler
FreeResource
ConvertThreadToFiber
FindNextChangeNotification
InterlockedCompareExchange
SetThreadLocale
GetCommandLineA
VirtualProtect
GetPrivateProfileSectionNamesA
ExitProcess
user32
GetNextDlgGroupItem
SetWindowRgn
DrawEdge
EnableMenuItem
MapVirtualKeyA
SetWinEventHook
SetPropW
GetUserObjectInformationW
CreateDesktopW
SetWindowWord
LockWindowUpdate
SystemParametersInfoW
EnumDisplaySettingsExA
TranslateMessage
EnumDisplaySettingsExW
GetDoubleClickTime
UnhookWindowsHook
EnumThreadWindows
ArrangeIconicWindows
GetProcessWindowStation
wvsprintfW
CreateMDIWindowW
InvertRect
OffsetRect
GetClientRect
GetMenuInfo
UnloadKeyboardLayout
SetScrollPos
DrawIconEx
SetLastErrorEx
RegisterHotKey
DrawMenuBar
InternalGetWindowText
LoadKeyboardLayoutA
GetWindow
EnumChildWindows
GetMenuItemID
OemToCharA
InsertMenuItemW
IsWindow
DefFrameProcA
DrawStateA
UpdateWindow
SetClassLongA
SubtractRect
MessageBoxExA
SwitchDesktop
IsDialogMessageA
LoadMenuIndirectW
ShowWindow
LoadIconW
MsgWaitForMultipleObjects
PeekMessageW
SetCaretBlinkTime
WindowFromPoint
AppendMenuA
EnableScrollBar
GetDC
GetWindowTextLengthA
CreateCaret
OpenClipboard
gdi32
SaveDC
BeginPath
advapi32
QueryServiceStatus
GetServiceKeyNameW
AccessCheckAndAuditAlarmW
GetUserNameW
RegOpenKeyW
CryptGetHashParam
PrivilegeCheck
SetSecurityDescriptorGroup
SetEntriesInAclA
FreeSid
CreateProcessAsUserW
SetPrivateObjectSecurity
OpenSCManagerA
LookupPrivilegeDisplayNameA
RegisterServiceCtrlHandlerW
NotifyChangeEventLog
BuildTrusteeWithSidW
InitiateSystemShutdownA
RegLoadKeyW
GetSecurityDescriptorControl
GetServiceDisplayNameW
RegisterEventSourceW
InitializeSecurityDescriptor
StartServiceCtrlDispatcherA
CreateServiceA
EnumDependentServicesW
SetFileSecurityW
LookupAccountNameA
AllocateAndInitializeSid
DeleteService
shell32
DragQueryFileW
SHGetMalloc
ole32
CreateItemMoniker
IsAccelerator
comctl32
ImageList_DragEnter
_TrackMouseEvent
shlwapi
PathRenameExtensionW
setupapi
SetupDiGetClassDescriptionW
SetupFindFirstLineW
SetupScanFileQueueW
SetupDiGetDeviceInstallParamsW
SetupDiSetSelectedDevice
SetupDiCallClassInstaller
Sections
.text Size: 292KB - Virtual size: 290KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE