Static task
static1
Behavioral task
behavioral1
Sample
3e37dc3967b986ba12158e65a11102ff_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3e37dc3967b986ba12158e65a11102ff_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3e37dc3967b986ba12158e65a11102ff_JaffaCakes118
-
Size
2.0MB
-
MD5
3e37dc3967b986ba12158e65a11102ff
-
SHA1
bcbc84f00ec12069ee07ce978c55fde502e306f8
-
SHA256
e2cfaf57e132f544fb8d4e983771d190af4b7374d419e3b4f68f659176e76a04
-
SHA512
f443f3c1de3efa46e7a4748a0875171dcaeeba65937909a977473c94224103b6edccf407e44cffe6960c752694f87d25f3728ae4659bbbd6a6eb13ec8cb17a11
-
SSDEEP
24576:aL9tQkW3sWAeedoNtkuFbygH0AwPDvGWahs/o5SFVHiz8OkaSrdfMAtdvUnNnck3:OCRc2BNBYGWahs/g2VIkNdLnUnNnck3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e37dc3967b986ba12158e65a11102ff_JaffaCakes118
Files
-
3e37dc3967b986ba12158e65a11102ff_JaffaCakes118.exe windows:4 windows x86 arch:x86
2cb350d559b791f0cc9a795fca21b3ee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
HeapAlloc
HeapFree
RaiseException
HeapSize
GetCommandLineA
GetModuleHandleA
GetStartupInfoA
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
LCMapStringA
LCMapStringW
RtlUnwind
IsBadWritePtr
IsBadCodePtr
GetLocaleInfoA
GetLocaleInfoW
SetStdHandle
ReadFile
WriteFile
CloseHandle
SetFilePointer
CreateDirectoryA
lstrcpyA
lstrlenA
RemoveDirectoryA
WaitForSingleObject
CreateProcessA
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameA
CreateMutexA
GlobalAddAtomA
GetFileAttributesA
GetVersionExA
GlobalFlags
MulDiv
lstrcmpiA
LoadLibraryA
GetStringTypeW
GetLastError
GetTempPathA
GetStringTypeA
CreateFileA
GetTempFileNameA
DeleteFileA
GetProcAddress
FreeLibrary
FlushFileBuffers
GetCurrentProcess
GetProcessVersion
GetCurrentThreadId
lstrcatA
TlsGetValue
GlobalGetAtomNameA
GetVersion
EnterCriticalSection
LocalReAlloc
TlsSetValue
GlobalLock
GlobalAlloc
GlobalReAlloc
GlobalHandle
LeaveCriticalSection
DeleteCriticalSection
GlobalUnlock
GlobalFree
LocalFree
TlsAlloc
InitializeCriticalSection
lstrcpynA
LocalAlloc
lstrcmpA
SetLastError
IsBadReadPtr
SetUnhandledExceptionFilter
user32
GetActiveWindow
DestroyMenu
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
GetClassNameA
PtInRect
ClientToScreen
GetDesktopWindow
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
PostQuitMessage
FindWindowA
InvalidateRect
SetRectEmpty
LoadAcceleratorsA
TranslateAcceleratorA
ReleaseCapture
LoadMenuA
SetMenu
ReuseDDElParam
UnpackDDElParam
IsIconic
BringWindowToTop
LoadCursorA
GetSystemMetrics
LoadIconA
PostMessageA
SystemParametersInfoA
MapWindowPoints
GetSysColor
PeekMessageA
DispatchMessageA
GetFocus
SetActiveWindow
IsWindow
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetClientRect
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
IsWindowVisible
ScreenToClient
ReleaseDC
SetScrollInfo
ShowScrollBar
SetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetMenu
DefWindowProcA
CreateWindowExA
GetClassLongA
SetPropA
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetWindow
GetWindowRect
RegisterWindowMessageA
GetParent
SetFocus
IsWindowEnabled
ShowWindow
SetWindowPos
SetWindowLongA
GetDlgCtrlID
GetWindowTextA
SetWindowTextA
GetWindowLongA
GetDlgItem
EnableWindow
SetCursor
ShowOwnedPopups
SendMessageA
LoadStringA
UnhookWindowsHookEx
CreateDialogParamA
DestroyWindow
UpdateWindow
MessageBoxA
DialogBoxParamA
GetDlgItemTextA
EndDialog
wsprintfA
GetDC
ScrollWindow
GetSysColorBrush
CallNextHookEx
SetWindowsHookExA
GetKeyState
gdi32
SetTextColor
GetDeviceCaps
GetObjectA
DeleteDC
RestoreDC
SelectObject
SaveDC
GetStockObject
SetViewportOrgEx
OffsetViewportOrgEx
SetMapMode
ScaleViewportExtEx
SetViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SetBkColor
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
CreateBitmap
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
DragFinish
DragQueryFileA
comctl32
ord17
ImageList_Destroy
Sections
.text Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ