Static task
static1
Behavioral task
behavioral1
Sample
3e24f86efbe8678550f8175a383542de_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3e24f86efbe8678550f8175a383542de_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3e24f86efbe8678550f8175a383542de_JaffaCakes118
-
Size
267KB
-
MD5
3e24f86efbe8678550f8175a383542de
-
SHA1
5e5e69e9cbe32de1daf2cf8385b77d6629c06229
-
SHA256
851e0c19917971faf55f188ef83304b5e1ba280f745cc664a1258ce99a4855c4
-
SHA512
1548fad55dd8618fef979af76edbdc415ba39d8fb7ef0380c4295ff883e41d837b73279742d7b8e1ebbd0c93bba506292ee72db5049d899cd071dc970b1216d6
-
SSDEEP
6144:YryGpmyzl1SsiZoylou4jl08RWQYaxkLdPUF:YCUl1zKjEjldRW1dZe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e24f86efbe8678550f8175a383542de_JaffaCakes118
Files
-
3e24f86efbe8678550f8175a383542de_JaffaCakes118.exe windows:4 windows x86 arch:x86
f3d2e0708d745f86b71bde118fdbfa07
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
LoadLibraryA
GetModuleFileNameA
GetLastError
GetACP
MultiByteToWideChar
GetModuleHandleA
GetCurrentProcess
GetVersionExA
IsBadReadPtr
ExitProcess
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
HeapCreate
TlsAlloc
GetOEMCP
GetCPInfo
GetStartupInfoA
GetEnvironmentStringsW
InitializeCriticalSection
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetSystemInfo
BeginUpdateResourceW
GetProcAddress
user32
MessageBoxA
advapi32
RegQueryValueExA
RegCloseKey
OpenProcessToken
ImpersonateLoggedOnUser
RevertToSelf
RegOpenKeyExA
scecli
SceStartTransaction
SceCopyBaseProfile
SceUpdateObjectInfo
SceConfigureConvertedFileSecurity
SceSvcSetInfo
SceRollbackTransaction
gptext
DllRegisterServer
Sections
CODE Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.r Size: 4KB - Virtual size: 777KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.zAIwxy Size: 3KB - Virtual size: 535KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 99KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xBbrj Size: 4KB - Virtual size: 909KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 122KB - Virtual size: 177KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.al Size: 2KB - Virtual size: 434KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ