Static task
static1
Behavioral task
behavioral1
Sample
3f6f92ffdb497ab526de18582c9f85f6_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3f6f92ffdb497ab526de18582c9f85f6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3f6f92ffdb497ab526de18582c9f85f6_JaffaCakes118
-
Size
2.5MB
-
MD5
3f6f92ffdb497ab526de18582c9f85f6
-
SHA1
f1e72d2a6bca97e327b6a9a08d0da0d70500cc47
-
SHA256
7b1eb535e3b85ab5ac5c1b4106705c027b271788ec7855231e3f47f2f7034e6c
-
SHA512
0d08597c387937795362d0a1359326123b03ce2314941f678fee212bb2c3a872eacb39da8a7148cae6bb26ff5c8e65e1a083e980a84b34c9037fd2169cf2863a
-
SSDEEP
49152:5X6Qfqk4tnfEAU6OEIskhFC8N0ZgNsPzNP2Bs3tjjLV:5X6QCkcnf86OEIRC9MsPRP2Bs3Rj5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f6f92ffdb497ab526de18582c9f85f6_JaffaCakes118
Files
-
3f6f92ffdb497ab526de18582c9f85f6_JaffaCakes118.exe windows:4 windows x86 arch:x86
085cd502ee042dfef531d6281620d497
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFindFileNameA
PathRemoveFileSpecA
PathAppendA
comctl32
InitCommonControlsEx
kernel32
GetTempPathA
GetLastError
GetFileAttributesA
CreateFileA
LoadLibraryA
GetVersionExA
DeleteFileA
CloseHandle
SetEnvironmentVariableA
FreeLibrary
WideCharToMultiByte
lstrcmpiA
CreateDirectoryA
GetTempFileNameA
lstrcatA
lstrcpyA
IsDBCSLeadByte
GlobalHandle
FindFirstFileA
TlsSetValue
FindClose
lstrcmpA
GlobalSize
TlsAlloc
GlobalAlloc
GlobalFree
SetFileAttributesA
GlobalLock
lstrcpynA
TlsGetValue
TlsFree
IsBadReadPtr
QueryPerformanceCounter
GlobalUnlock
GlobalReAlloc
SetFileTime
SetEndOfFile
LocalFileTimeToFileTime
DosDateTimeToFileTime
UnhandledExceptionFilter
DecodePointer
GetConsoleMode
CreateFileW
GetCurrentThreadId
HeapSize
SetFilePointerEx
GetProcessHeap
LCMapStringW
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
HeapReAlloc
GetFileType
HeapAlloc
HeapFree
GetModuleHandleExW
ExitProcess
GetModuleFileNameW
GetStdHandle
IsDebuggerPresent
LoadLibraryExW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
EncodePointer
RaiseException
GetEnvironmentVariableA
SetFilePointer
ExpandEnvironmentStringsA
WriteFile
SetLastError
SizeofResource
GetModuleFileNameA
ReadFile
FormatMessageA
GetProcAddress
LoadResource
LockResource
MultiByteToWideChar
GetModuleHandleA
lstrlenA
FindResourceA
FlushFileBuffers
SetUnhandledExceptionFilter
GetStartupInfoW
GetConsoleCP
WriteConsoleW
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentProcessId
GetModuleHandleW
GetCurrentProcess
TerminateProcess
RtlUnwind
IsProcessorFeaturePresent
user32
DestroyIcon
MessageBoxA
LoadStringA
EnableWindow
DispatchMessageA
GetActiveWindow
TranslateMessage
OemToCharA
PeekMessageA
CharNextA
wsprintfA
GetMessagePos
GetWindowRect
LoadCursorA
DestroyWindow
GetDC
IsWindowVisible
SetWindowPos
PostMessageA
ScreenToClient
EndDialog
GetClassNameA
DialogBoxParamA
ShowWindow
OffsetRect
GetDlgItemTextA
SetTimer
LoadImageA
SetWindowLongA
CallWindowProcA
GetWindowTextA
MapWindowPoints
GetWindowLongA
SetWindowTextA
GetSysColor
IsDlgButtonChecked
SetFocus
SendDlgItemMessageA
SetDlgItemTextA
SendMessageA
EnumThreadWindows
SetCursor
LoadIconA
GetClientRect
GetDlgItem
KillTimer
CheckDlgButton
GetDesktopWindow
ReleaseDC
GetCursorPos
gdi32
SelectObject
CreateDIBSection
GetTextExtentPoint32A
CreateCompatibleDC
StretchBlt
GetStockObject
GetDIBits
DeleteDC
SetTextColor
CreatePen
Rectangle
CreateFontIndirectA
SetBkColor
SetStretchBltMode
DeleteObject
GetObjectA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
ShellExecuteExA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoTaskMemFree
OleInitialize
OleUninitialize
Sections
.text Size: 142KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.opuszsx Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ