Static task
static1
Behavioral task
behavioral1
Sample
3ea640392e0cb76f220b9c876290598a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3ea640392e0cb76f220b9c876290598a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3ea640392e0cb76f220b9c876290598a_JaffaCakes118
-
Size
300KB
-
MD5
3ea640392e0cb76f220b9c876290598a
-
SHA1
2f2c4df11003bdd05c33837846e3516b0c996b2e
-
SHA256
5d0e8e75d8d7331a26c47794d1e562eb3fb920f6ab37d8d4950cccdf58c6c0ba
-
SHA512
9dcf942a41883fe5cf66f59aeb12c782d9e1a3dcfe238dc25eb89a9791c14db3b005b63b94cc432f27a99c1829039678f6ece1e61b5f3f3025a6bf04aed6f867
-
SSDEEP
6144:551hCjxKY7XqLSIVMK1hVK2qKdSpa4K9DorkITZGszM/D0LY20W2CPzL0VgPzJl:5z8jgY76WIVMaUKd74GitYhUY2h7P/0g
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ea640392e0cb76f220b9c876290598a_JaffaCakes118
Files
-
3ea640392e0cb76f220b9c876290598a_JaffaCakes118.exe windows:4 windows x86 arch:x86
82269616d373f2150eab219228c236af
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProfileStringW
ClearCommError
SetTimeZoneInformation
GetBinaryTypeW
WinExec
_lread
HeapAlloc
SetConsoleTextAttribute
FoldStringW
AllocConsole
FillConsoleOutputCharacterA
DeleteFiber
GetSystemDefaultLangID
WriteFileEx
GetPrivateProfileStringA
WritePrivateProfileSectionA
GetVersionExA
SetFilePointer
GetSystemTime
IsBadCodePtr
HeapCreate
SetLocalTime
ReadFileScatter
FatalAppExitA
GetLargestConsoleWindowSize
WriteFileGather
lstrcpynW
CreateSemaphoreW
GlobalFindAtomW
GetHandleInformation
VirtualAlloc
GetLogicalDriveStringsW
SuspendThread
ExpandEnvironmentStringsW
GetAtomNameA
GetFullPathNameW
CreateFileA
SetConsoleWindowInfo
ExitThread
OpenMutexW
FindClose
SwitchToFiber
GetOverlappedResult
HeapFree
ExpandEnvironmentStringsA
FileTimeToSystemTime
GetCommProperties
EnumSystemCodePagesW
IsBadReadPtr
GetCommModemStatus
WaitCommEvent
GetFileInformationByHandle
AreFileApisANSI
DeleteCriticalSection
SetupComm
lstrcpyW
WriteConsoleInputW
lstrlenA
GetFullPathNameA
IsDBCSLeadByte
TryEnterCriticalSection
UnhandledExceptionFilter
GetSystemTimeAdjustment
GetFileAttributesExA
GetQueuedCompletionStatus
GetTapePosition
SetCommMask
GetCommandLineA
VirtualProtect
GetProcessVersion
ExitProcess
user32
GetClassLongW
CharLowerW
GetMessagePos
EqualRect
IsWindowEnabled
PostThreadMessageW
SystemParametersInfoW
SetDlgItemTextW
RegisterClipboardFormatW
DrawIconEx
GetNextDlgTabItem
ScreenToClient
WinHelpA
GetScrollInfo
SetCursor
GetDCEx
LoadImageW
CreateDialogIndirectParamA
VkKeyScanA
MsgWaitForMultipleObjectsEx
ModifyMenuW
SetScrollInfo
SetThreadDesktop
WaitMessage
SendDlgItemMessageW
CreateIcon
GetClipboardFormatNameW
GetWindowTextLengthW
CreateIconIndirect
GetDesktopWindow
InsertMenuItemW
GetMonitorInfoA
gdi32
CreateEnhMetaFileA
CopyMetaFileW
GetGlyphOutlineW
SetColorAdjustment
PolyBezierTo
GetDIBits
SetBitmapDimensionEx
GetCharacterPlacementW
Pie
EnumFontFamiliesExW
ExtEscape
Polyline
GetTextExtentExPointA
CreateBitmapIndirect
SetTextJustification
ExtTextOutW
PlayEnhMetaFileRecord
advapi32
BuildTrusteeWithSidW
GetSecurityDescriptorControl
shell32
SHGetSpecialFolderPathW
DoEnvironmentSubstW
DragQueryPoint
SHGetDesktopFolder
ole32
CoCreateInstanceEx
StgOpenStorageEx
WriteFmtUserTypeStg
GetClassFile
OleGetClipboard
oleaut32
SafeArrayCreate
GetErrorInfo
SysAllocStringLen
GetActiveObject
VariantChangeType
SysAllocString
comctl32
PropertySheetA
shlwapi
PathRelativePathToA
StrRetToBufW
UrlCanonicalizeW
StrFormatByteSizeA
PathUndecorateW
StrPBrkW
PathFindExtensionA
SHRegGetBoolUSValueW
PathIsRelativeW
UrlGetPartA
PathRemoveBlanksA
PathIsDirectoryA
SHDeleteKeyA
PathAppendA
PathRemoveBackslashA
PathStripToRootW
StrCatW
setupapi
SetupLogErrorA
SetupPromptReboot
SetupDiCreateDeviceInfoList
Sections
.text Size: 268KB - Virtual size: 265KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE