Static task
static1
Behavioral task
behavioral1
Sample
3dfe807a1390c46a7ed086540237ebea_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3dfe807a1390c46a7ed086540237ebea_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3dfe807a1390c46a7ed086540237ebea_JaffaCakes118
-
Size
192KB
-
MD5
3dfe807a1390c46a7ed086540237ebea
-
SHA1
b3a435b3ed31883dc4ac496f508a1b24dc850490
-
SHA256
4955f11a2715092ffac980a9c9d3ca038579c1f7c4e468e292280e735a6227de
-
SHA512
bf40a1bf1870f8ed76b2cdd61747a2723ce3648d3f5d4c685d15b59be5a95f5258b72dd39abbe23f2b8ed6450a20d6c3dea5b0732f3b17d89e766ac735e40697
-
SSDEEP
3072:Jg2SKvUStVPBBEgXkcEsXwcgsuuhz0aBalnpAOmSLe5Es979ZW:uKvUSt3ylsAcHh0aC49ZW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3dfe807a1390c46a7ed086540237ebea_JaffaCakes118
Files
-
3dfe807a1390c46a7ed086540237ebea_JaffaCakes118.exe windows:4 windows x86 arch:x86
90a369219663a7d44916b75fc652d425
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupIterateCabinetA
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
kernel32
GetFileTime
GetLocaleInfoA
GetCPInfo
GetOEMCP
HeapAlloc
HeapFree
HeapReAlloc
VirtualAlloc
GetSystemTimeAsFileTime
RtlUnwind
ExitProcess
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
HeapSize
GetFileAttributesA
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
FileTimeToLocalFileTime
GlobalFlags
FileTimeToSystemTime
lstrcmpA
InterlockedIncrement
GetModuleFileNameW
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetVersionExA
SetErrorMode
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
CloseHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetModuleHandleA
FreeResource
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
MulDiv
SetLastError
LocalFree
GetProcAddress
CreateMutexA
ReleaseMutex
GetModuleFileNameA
GetTickCount
GetTempFileNameA
LoadLibraryA
FreeLibrary
InterlockedDecrement
CompareStringW
CompareStringA
lstrlenW
Sleep
GetTempPathA
lstrcpyA
lstrcatA
lstrlenA
GetVersion
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
user32
UnregisterClassA
PostQuitMessage
DestroyMenu
GetMessageA
TranslateMessage
ValidateRect
LoadCursorA
GetSysColorBrush
GetWindowThreadProcessId
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
UpdateWindow
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CharUpperA
MessageBoxA
DrawIcon
SendMessageA
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
SetWindowsHookExA
IsIconic
GetClientRect
EnableWindow
GetSystemMetrics
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
EndDialog
GetNextDlgTabItem
GetParent
IsWindowEnabled
GetDlgItem
GetWindowLongA
IsWindow
DestroyWindow
CreateDialogIndirectParamA
SetActiveWindow
ReleaseDC
GetDC
CopyRect
GetDesktopWindow
GetActiveWindow
CallNextHookEx
gdi32
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
RectVisible
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
GetClipBox
GetDeviceCaps
PtVisible
DeleteObject
SetMapMode
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
TextOutA
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyA
RegEnumKeyA
RegEnumKeyExA
RegOpenKeyA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
shell32
ShellExecuteA
shlwapi
PathStripToRootA
PathIsUNCA
PathFindFileNameA
PathFindExtensionA
SHSetValueA
ole32
CoInitializeEx
CoInitializeSecurity
CoUninitialize
CoSetProxyBlanket
CLSIDFromString
StringFromCLSID
CoTaskMemFree
CoCreateInstance
oleaut32
SysAllocString
SysFreeString
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 140KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ