Static task
static1
Behavioral task
behavioral1
Sample
3f89e9949a176e0b3c774f940a06cafe_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3f89e9949a176e0b3c774f940a06cafe_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3f89e9949a176e0b3c774f940a06cafe_JaffaCakes118
-
Size
1.9MB
-
MD5
3f89e9949a176e0b3c774f940a06cafe
-
SHA1
415331cd3ed93b48ef2c7eaa6aab3b8e4e9e9389
-
SHA256
e12b580f0c871a74a6790d093aa87185fec6a9317dd9254308f53454bd14c1b7
-
SHA512
d3ae40502d177e89cddf7b76e23c75ef0967be7b26a7fd2e329b09ecbee576d93fd2feb670f468b1aec83ab7a0a4f0e6e649d1a96563f441d6d53a384773e159
-
SSDEEP
49152:naEJ/rfpXpKb+sftV6oc5i6zj0Uo3u4H+B8Gwzgrjtv3G:naERBoaCo5i6zAUPZRjtv3G
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f89e9949a176e0b3c774f940a06cafe_JaffaCakes118
Files
-
3f89e9949a176e0b3c774f940a06cafe_JaffaCakes118.exe windows:4 windows x86 arch:x86
d3207d1d132e86cac773e9b37a956cab
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WinExec
GetDriveTypeA
GetModuleFileNameA
GetCurrentProcess
GetShortPathNameA
FindClose
FindFirstFileA
GetDiskFreeSpaceA
lstrlenA
MoveFileExA
SetCurrentDirectoryA
GlobalHandle
GlobalUnlock
GlobalFree
GlobalAlloc
GlobalLock
CloseHandle
SetFilePointer
WriteFile
ReadFile
CreateFileA
LocalAlloc
GetTempPathA
LocalFree
FormatMessageA
lstrcatA
CopyFileA
SetFileTime
LoadLibraryA
GetProcAddress
FreeLibrary
WritePrivateProfileStringA
GetPrivateProfileStringA
GetWindowsDirectoryA
GetSystemDirectoryA
GetSystemTime
GetTickCount
GetExitCodeProcess
CreateProcessA
GetFullPathNameA
MultiByteToWideChar
GetVersionExA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
WideCharToMultiByte
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
SetUnhandledExceptionFilter
RtlUnwind
CreateDirectoryA
RaiseException
TerminateProcess
HeapCompact
GetLastError
ExitProcess
MoveFileA
DeleteFileA
GetCurrentDirectoryA
SetEnvironmentVariableA
GetFileAttributesA
SetFileAttributesA
HeapAlloc
HeapFree
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
user32
KillTimer
ScreenToClient
ReleaseDC
IsDlgButtonChecked
ShowWindow
GetDlgItem
GetWindowRect
CreateDialogIndirectParamA
IsDialogMessageA
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
EnableWindow
SetFocus
CheckRadioButton
SetTimer
MessageBoxA
CloseClipboard
GetClipboardData
OpenClipboard
IsClipboardFormatAvailable
GetDlgItemTextA
SendDlgItemMessageA
SetDlgItemTextA
PeekMessageA
SendMessageA
EndPaint
BeginPaint
CheckDlgButton
GetClientRect
EndDialog
PostMessageA
RegisterWindowMessageA
OemToCharA
GetDC
wsprintfA
FillRect
SetWindowLongA
DrawTextA
CreateWindowExA
GetWindow
LoadIconA
LoadCursorA
RegisterClassA
FindWindowA
GetLastActivePopup
BringWindowToTop
GetSystemMetrics
AdjustWindowRectEx
UpdateWindow
DialogBoxIndirectParamA
ExitWindowsEx
DefWindowProcA
PostQuitMessage
IsIconic
RedrawWindow
SetWindowPos
SetWindowTextA
GetSysColor
GetParent
gdi32
AddFontResourceA
CreateSolidBrush
DeleteObject
CreateFontIndirectA
GetObjectA
ExtTextOutA
SetBkColor
CreatePalette
GetSystemPaletteEntries
GetDeviceCaps
StretchDIBits
RealizePalette
SelectPalette
IntersectClipRect
CreateDIBPatternBrush
SetTextColor
SetBkMode
SelectObject
DeleteDC
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
comdlg32
GetSaveFileNameA
GetOpenFileNameA
advapi32
RegCreateKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
DragQueryFileA
DragFinish
ShellExecuteA
DragAcceptFiles
ole32
CoCreateInstance
OleInitialize
OleUninitialize
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
VerFindFileA
Sections
.text Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ