Static task
static1
Behavioral task
behavioral1
Sample
3f8f3ab0f7ad6f2ca1b9a62294fdd3e9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3f8f3ab0f7ad6f2ca1b9a62294fdd3e9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3f8f3ab0f7ad6f2ca1b9a62294fdd3e9_JaffaCakes118
-
Size
22KB
-
MD5
3f8f3ab0f7ad6f2ca1b9a62294fdd3e9
-
SHA1
3140d369e0b2c7d38f7174b3b4ae47e340aa9cd3
-
SHA256
22ccff22f94e9ff7d9ef4f355b3e842d03d75bc29d30397754086938c96546a7
-
SHA512
6cf0581aa9d8e3a859fb7e82ed6ce41e6e5428b170a812d78ec3e90ea7874629135aaa5764b11319e0dbda56e6e706dbe9c494438bf09cb63082926ef06c5154
-
SSDEEP
384:lat6/X0J+BDr+tT33IAvvI+iOxm9A9CpMiBql3DDT0wpDrgU6t1JTu:lK6fA6rsHIAvvhxMpMi+zDwwpgUO1Ja
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f8f3ab0f7ad6f2ca1b9a62294fdd3e9_JaffaCakes118
Files
-
3f8f3ab0f7ad6f2ca1b9a62294fdd3e9_JaffaCakes118.exe windows:1 windows x86 arch:x86
c3e85bb31b69768d30d98c88b51c29da
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
user32
OffsetRect
IsClipboardFormatAvailable
ReleaseDC
OpenClipboard
MessageBoxA
KillTimer
SetTimer
ScreenToClient
SetWindowPos
ReleaseCapture
SetDlgItemTextA
SetCapture
SetClipboardData
LoadBitmapA
wsprintfA
SetWindowTextA
SendMessageA
SendDlgItemMessageA
BeginPaint
CharUpperA
CloseClipboard
DialogBoxParamA
DrawEdge
EmptyClipboard
EnableWindow
EndDialog
EndPaint
FrameRect
GetClientRect
GetClipboardData
GetCursorPos
GetDC
GetDlgItem
GetWindowRect
InflateRect
gdi32
GetObjectA
DeleteObject
DeleteDC
CreateSolidBrush
CreateFontIndirectA
CreateCompatibleDC
SetTextColor
SetBkMode
BitBlt
SetBkColor
SelectObject
kernel32
SetUnhandledExceptionFilter
OpenMutexA
GlobalAlloc
GlobalUnlock
SizeofResource
GlobalLock
GetModuleHandleA
ExitProcess
Sections
TMG Size: 3KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
TMG Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
TMG Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pec Size: 1024B - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE