Static task
static1
Behavioral task
behavioral1
Sample
3eeff64aad6d0b5fbeb661d54c43ca7c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3eeff64aad6d0b5fbeb661d54c43ca7c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3eeff64aad6d0b5fbeb661d54c43ca7c_JaffaCakes118
-
Size
775KB
-
MD5
3eeff64aad6d0b5fbeb661d54c43ca7c
-
SHA1
0dabe00304543394ae87d826de684691f857b9d1
-
SHA256
481a678a8859165f9816bfa224a25816c56a890fa3ca9ed7ff43b24dcb574709
-
SHA512
f4f05a02932f8e0187ccccce989882fe1e0f4fa8c70410afb58d1db5e1f3925dccdae09e328374c938d36e630d3ce11c7ee6711cc0ccc40fcdfab1614d4976a5
-
SSDEEP
12288:ZiHsrmYJhLWnnOHrF5n0LQrHAG6IOr17UFCVWcu1yrF3Q7TJUwm94gPo/HPKUDyn:sHsrmoNroLQrgGZyVW/1yrO+M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3eeff64aad6d0b5fbeb661d54c43ca7c_JaffaCakes118
Files
-
3eeff64aad6d0b5fbeb661d54c43ca7c_JaffaCakes118.exe windows:4 windows x86 arch:x86
440bb365512357bac7c0855745fcd6dc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DdeDisconnectList
BringWindowToTop
RedrawWindow
GetUpdateRect
RegisterClassA
LoadKeyboardLayoutW
CreateAcceleratorTableA
SetWindowTextA
AdjustWindowRectEx
DestroyAcceleratorTable
RegisterClassExA
DdeCmpStringHandles
GetCaretBlinkTime
CreateIconIndirect
EnumDesktopsA
RegisterClipboardFormatW
EnumWindowStationsW
GetDesktopWindow
shell32
ExtractIconExA
ExtractIconA
SHGetFileInfo
SHBrowseForFolderA
ShellExecuteA
comctl32
InitCommonControlsEx
gdi32
DrawEscape
FlattenPath
PathToRegion
GetTextColor
CreateMetaFileA
CloseMetaFile
GetBkMode
GetTextExtentExPointW
GetNearestPaletteIndex
CreateDIBPatternBrushPt
kernel32
GetCurrentProcess
RtlUnwind
EnterCriticalSection
TlsGetValue
FreeEnvironmentStringsW
GetConsoleTitleA
CloseHandle
InterlockedExchange
CompareStringW
GetSystemTime
GetSystemTimeAsFileTime
GetTimeZoneInformation
TerminateProcess
GetACP
HeapDestroy
GetModuleHandleA
GetStartupInfoA
LocalReAlloc
FlushFileBuffers
GetEnvironmentStringsW
GetCommandLineA
GetModuleFileNameA
UnhandledExceptionFilter
GetLocalTime
OpenWaitableTimerA
IsBadWritePtr
GetOEMCP
FreeEnvironmentStringsA
InitializeCriticalSection
LeaveCriticalSection
GetLogicalDriveStringsA
CompareStringA
SetStdHandle
GetTimeFormatA
TlsAlloc
ExitProcess
GetCurrentProcessId
HeapCreate
GetProcAddress
SetHandleCount
LoadLibraryA
VirtualFree
SetLastError
SetFilePointer
GetDiskFreeSpaceExW
lstrcmpi
GetEnvironmentStrings
MultiByteToWideChar
GetTempFileNameW
GetStdHandle
VirtualAlloc
WriteFile
GetFileType
CopyFileA
OpenMutexA
QueryPerformanceCounter
GetCurrentThreadId
GetCPInfo
InterlockedIncrement
DeleteCriticalSection
GetVersion
HeapReAlloc
InterlockedDecrement
LCMapStringA
TlsFree
GetThreadContext
GetLastError
GetStringTypeW
LCMapStringW
SetEnvironmentVariableA
WriteConsoleOutputAttribute
ReadFile
TlsSetValue
CreateSemaphoreW
HeapFree
GetStringTypeA
GetCurrentThread
VirtualQuery
GetTickCount
GetCompressedFileSizeA
HeapAlloc
WideCharToMultiByte
CreateMutexA
Sections
.text Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 633KB - Virtual size: 475KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ