Static task
static1
Behavioral task
behavioral1
Sample
3ff1182ec60006331bc10a0eff8d66dd_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ff1182ec60006331bc10a0eff8d66dd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3ff1182ec60006331bc10a0eff8d66dd_JaffaCakes118
-
Size
23KB
-
MD5
3ff1182ec60006331bc10a0eff8d66dd
-
SHA1
8b6c7fb76033fe1d3e4f0d0e0ce0244442290676
-
SHA256
33fce337b374650f54bcebac4142846390023f28cc4c808b9f6282162b5fa697
-
SHA512
d29f3e9b1413021f9ec5162642765cd363209498e3fe7752ff0538a27a670a66c7ea30e7adc0d322603511de6376fc1f9bc5be0bfe9fe4c5df42483e3154ec34
-
SSDEEP
384:S57UatzrnchIPALuXm6RMNbftgIagLQHuLJjYANd7Jg6cD+3o:Na3ALu27Rhag8H6Hn1NcD+3o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ff1182ec60006331bc10a0eff8d66dd_JaffaCakes118
Files
-
3ff1182ec60006331bc10a0eff8d66dd_JaffaCakes118.exe windows:4 windows x86 arch:x86
7c8fd98a7001ad16bf5bb653f98d8b8a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
VirtualFree
Sleep
GetCurrentThread
GetLastError
CloseHandle
HeapLock
WriteFile
VirtualAlloc
OpenSemaphoreA
OpenFile
HeapUnlock
GetModuleHandleA
GetCurrentProcessId
GetCurrentThreadId
HeapSize
DeleteFileA
ExitProcess
CreateEventA
LocalSize
GetSystemInfo
VirtualProtect
GetLocaleInfoA
RtlUnwind
GetStringTypeW
GetProcAddress
VirtualAllocEx
GetCurrentProcess
ResumeThread
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
VirtualQuery
GetStartupInfoA
GetCommandLineA
GetVersionExA
TerminateProcess
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
HeapReAlloc
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
user32
IsChild
PostMessageA
LoadStringA
IsWindowVisible
gdi32
CreatePatternBrush
advapi32
OpenProcessToken
psapi
GetModuleBaseNameA
GetProcessMemoryInfo
msvfw32
DrawDibDraw
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 285KB - Virtual size: 688KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ