m:\
Static task
static1
Behavioral task
behavioral1
Sample
3fc7385cf0d0d3cb54b5e0a53755a02b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3fc7385cf0d0d3cb54b5e0a53755a02b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3fc7385cf0d0d3cb54b5e0a53755a02b_JaffaCakes118
-
Size
288KB
-
MD5
3fc7385cf0d0d3cb54b5e0a53755a02b
-
SHA1
f8b5130440929a6779e0d7faf74b52e653363625
-
SHA256
16d6fa54fd7fcd8c451bd93aae3a6bf906fa49c5cdcafb045ef6a94809ef9f92
-
SHA512
cc1c00000b390baa2d651eb9b3dddfd2de38df233303ae817a1f75105bb818fac1ba9fa2c0e9351e7aa32cb0ee170bc6e71d8ffa7f91053230832c4a386c1459
-
SSDEEP
6144:EW95kl9K2Un8NnKhDtFUwYWqQhEETSkjKA:EW90c2iynKRtFUwYWqQCZk2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3fc7385cf0d0d3cb54b5e0a53755a02b_JaffaCakes118
Files
-
3fc7385cf0d0d3cb54b5e0a53755a02b_JaffaCakes118.exe windows:4 windows x86 arch:x86
155cbe6c9b8e154e35f5dd56ab8148a0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GlobalUnlock
GetEnvironmentStrings
HeapSize
GetStringTypeA
EnumSystemLocalesA
GetSystemTimeAsFileTime
VirtualAlloc
IsValidCodePage
VirtualFree
FreeEnvironmentStringsW
HeapFree
ReadFile
SetLastError
SetFilePointer
GetCurrentProcessId
TlsGetValue
GetStartupInfoW
GetModuleFileNameA
GetWindowsDirectoryW
GetFileType
GetCommandLineW
LCMapStringW
CloseHandle
IsBadWritePtr
OpenMutexA
GetACP
QueryPerformanceCounter
SetEnvironmentVariableA
HeapReAlloc
GetSystemInfo
FlushFileBuffers
HeapDestroy
UnhandledExceptionFilter
GetTimeZoneInformation
GetCurrentThreadId
TlsSetValue
WideCharToMultiByte
InterlockedExchange
GetTickCount
GetStdHandle
GetProcAddress
IsValidLocale
DeleteCriticalSection
GetModuleFileNameW
InitializeCriticalSection
ExitProcess
LeaveCriticalSection
TlsFree
TlsAlloc
CompareStringA
SetStdHandle
WriteFile
CreateMutexA
GetStartupInfoA
GetCurrentThread
HeapAlloc
GetCurrentProcess
SetHandleCount
EnterCriticalSection
GetDateFormatA
GetCPInfo
RtlFillMemory
LoadLibraryA
SetVolumeLabelW
GetModuleHandleA
VirtualProtect
WriteProfileStringW
GetUserDefaultLCID
GetVersionExA
MultiByteToWideChar
lstrcmpiA
TerminateProcess
HeapCreate
CompareStringW
FreeEnvironmentStringsA
GlobalCompact
LCMapStringA
GetLocaleInfoW
GetLocaleInfoA
GetCommandLineA
GetTimeFormatA
GetOEMCP
GetStringTypeW
GetLastError
GetEnvironmentStringsW
RtlUnwind
VirtualQuery
comctl32
CreateUpDownControl
CreateStatusWindowW
ImageList_Add
ImageList_GetImageRect
DrawStatusTextA
ImageList_DragEnter
InitCommonControlsEx
ImageList_DragMove
ImageList_AddMasked
ImageList_SetBkColor
ImageList_AddIcon
user32
DrawTextW
SetForegroundWindow
GetWindowModuleFileNameA
DefMDIChildProcW
DrawMenuBar
WaitForInputIdle
SubtractRect
InSendMessage
CopyAcceleratorTableW
GetProcessWindowStation
WINNLSGetEnableStatus
EndDeferWindowPos
FindWindowW
AttachThreadInput
LoadKeyboardLayoutA
GetMenuStringA
ScreenToClient
RegisterClassA
IsCharUpperA
ScrollWindow
ChangeDisplaySettingsA
GetScrollBarInfo
SetUserObjectInformationW
CallMsgFilterW
RegisterClassExA
GetClipboardOwner
gdi32
CheckColorsInGamut
CreateMetaFileW
GetNearestColor
IntersectClipRect
EndDoc
ScaleWindowExtEx
MaskBlt
CreateRectRgnIndirect
CreateCompatibleDC
GetTextCharacterExtra
GetCharWidthW
PatBlt
LPtoDP
SetICMProfileA
GdiPlayDCScript
CreatePen
FillPath
PolyTextOutW
GetKerningPairs
PlayEnhMetaFileRecord
GetEnhMetaFileHeader
Sections
.text Size: 76KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ