Static task
static1
Behavioral task
behavioral1
Sample
3de514fca63aa92e8714509ab418f3d2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3de514fca63aa92e8714509ab418f3d2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3de514fca63aa92e8714509ab418f3d2_JaffaCakes118
-
Size
224KB
-
MD5
3de514fca63aa92e8714509ab418f3d2
-
SHA1
7d37057bbf76515ee1ced33992db2a024b29d8f3
-
SHA256
e8e95f503e8a576f4f39433b1957b07fa3dcf73b1ab87a2154b7e7361b110b7f
-
SHA512
e11b10f24cdc3d28d134dfd4d640ae48e63d907eacf0a090df41495dd727518d8d8134be547f693ff91a8cc8e20b5554ddf7c9972cd13b05f34d77a9008bd385
-
SSDEEP
3072:vVGGC05feWk0rZbTcor0aJD3pmuC3VmkebW1gmIvxeb/zx8lHUUIub+o71WO04kJ:dGLwfeF0hdDmuClqzIubb1l/2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3de514fca63aa92e8714509ab418f3d2_JaffaCakes118
Files
-
3de514fca63aa92e8714509ab418f3d2_JaffaCakes118.exe windows:4 windows x86 arch:x86
fec9cd9555033182f60046d695194b9f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForMultipleObjects
CancelIo
WideCharToMultiByte
GetProcAddress
LoadLibraryA
ResetEvent
FreeLibrary
CreateProcessA
GetCurrentProcessId
GetModuleFileNameA
CreateSemaphoreA
ReleaseSemaphore
CreateThread
GetCurrentThreadId
TlsSetValue
ExitThread
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapFree
HeapAlloc
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetCurrentThread
TerminateProcess
UnhandledExceptionFilter
RtlUnwind
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
WaitForSingleObject
DeviceIoControl
HeapDestroy
HeapCreate
VirtualFree
CloseHandle
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
VirtualAlloc
HeapReAlloc
IsBadWritePtr
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
GetStringTypeA
GetStringTypeW
ReadFile
SetStdHandle
LCMapStringA
LCMapStringW
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
GetVersionExA
FlushFileBuffers
GetTimeZoneInformation
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetExitCodeProcess
Sleep
CreateFileA
OpenProcess
GetCurrentProcess
DuplicateHandle
CreateMailslotA
GetLastError
CreateEventA
DeleteCriticalSection
GetFileType
WriteFile
user32
wsprintfA
WinHelpA
advapi32
RegDeleteValueA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
ControlService
OpenSCManagerA
OpenServiceA
StartServiceA
CloseServiceHandle
RegOpenKeyExA
RegEnumKeyExA
winmm
timeSetEvent
usrrtosa
ISF_TMBPostMessage
usrdtea
?ReadSReg@SregConfig@@QAEEH@Z
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PACK Size: 144KB - Virtual size: 380KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE