Static task
static1
Behavioral task
behavioral1
Sample
3dfc1334f714ff5bcea40d73d5eac6d9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3dfc1334f714ff5bcea40d73d5eac6d9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3dfc1334f714ff5bcea40d73d5eac6d9_JaffaCakes118
-
Size
216KB
-
MD5
3dfc1334f714ff5bcea40d73d5eac6d9
-
SHA1
81680a0152f5b78777e4c910ede136c0dcc7361d
-
SHA256
6d44e014f2a8b3d3045e2a701c13048384459bfbbd9268c4896cbe813ea2a207
-
SHA512
128dfb32d73bee3885bcbffac2c9892074794c4664a4e834019ee8e6360311895da59af02b60ddf8b8b86515221271705b2def2bb99a81a3f0bab45514fc8f63
-
SSDEEP
6144:e+t8rbgcBntcEjjNuMn1sc7ZCVgnGtmka1oLxP31X:xGrbga3uMn1/CSGtmkaqt1X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3dfc1334f714ff5bcea40d73d5eac6d9_JaffaCakes118
Files
-
3dfc1334f714ff5bcea40d73d5eac6d9_JaffaCakes118.exe windows:4 windows x86 arch:x86
d91eca83d40a445135c47739a53bacbb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
AddAtomA
ExitProcess
FindAtomA
GetAtomNameA
SetUnhandledExceptionFilter
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
free
malloc
memcpy
memset
signal
strcpy
strlen
wcscpy
user32
AdjustWindowRectEx
AppendMenuW
BeginDeferWindowPos
BringWindowToTop
CallNextHookEx
CheckMenuItem
ClientToScreen
CloseClipboard
CreateAcceleratorTableW
CreateDialogIndirectParamW
CreateDialogParamW
CreateIconIndirect
CreateMenu
CreatePopupMenu
DefFrameProcW
DefMDIChildProcW
DestroyAcceleratorTable
DestroyCursor
DestroyMenu
DestroyWindow
DispatchMessageW
DrawEdge
DrawIcon
EnableMenuItem
EnableWindow
EnumClipboardFormats
EnumWindows
FillRect
FlashWindow
GetActiveWindow
GetAsyncKeyState
GetClassInfoW
GetClassNameW
GetClipboardData
GetClipboardFormatNameW
GetCursorPos
GetDC
GetDesktopWindow
GetDlgItem
GetFocus
GetForegroundWindow
GetIconInfo
GetKeyState
GetMenuItemCount
GetMenuItemInfoW
GetMenuState
GetMenuStringW
GetMessageTime
GetMessageW
GetParent
GetScrollInfo
GetSubMenu
GetSysColor
GetUpdateRgn
GetWindowDC
GetWindowTextLengthW
GetWindowTextW
GetWindowThreadProcessId
HideCaret
InflateRect
InvalidateRect
IsWindow
IsWindowEnabled
IsWindowVisible
IsZoomed
LoadCursorFromFileW
LoadCursorW
LoadIconW
MapWindowPoints
MessageBeep
ModifyMenuW
MoveWindow
MsgWaitForMultipleObjects
OffsetRect
OpenClipboard
PostMessageW
PostQuitMessage
PostThreadMessageW
RegisterClassW
RegisterHotKey
ReleaseCapture
ReleaseDC
RemoveMenu
SetCapture
SetCursor
SetCursorPos
SetFocus
SetMenu
SetScrollInfo
SetWindowPos
SetWindowTextW
SetWindowsHookExW
ShowCaret
ShowCursor
ShowWindow
TranslateAcceleratorW
TranslateMDISysAccel
TranslateMessage
UnhookWindowsHookEx
UnionRect
UnregisterHotKey
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 70KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ