Static task
static1
Behavioral task
behavioral1
Sample
a3ab88bf69a1bf72bcfefbe779635104_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a3ab88bf69a1bf72bcfefbe779635104_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a3ab88bf69a1bf72bcfefbe779635104_JaffaCakes118
-
Size
47KB
-
MD5
a3ab88bf69a1bf72bcfefbe779635104
-
SHA1
28f3f580cc1ccd2f2ed0d3f991c7cc1ea64d5d7c
-
SHA256
bbe63bd4713e2f933298f6e69cc5815debc179af8e872d96ac63539f61ed9d5d
-
SHA512
43b5a962316ba1e4d284940243d69923c0f6e14e180ba8ccffb591e3c3fe0c208ada4c75fd823f2061e252db04d515d75d9f9883b4b7bc1204970fbffeb37f70
-
SSDEEP
768:f/JBemNyxZ8efTFkoqDPYx9+7Qz8+DlrI09W9M3ne+qDbQBbPMYGIFIdv8hoP/Dn:HJBRyz8ehkokg27YUoywa+GEiwoPW5b+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a3ab88bf69a1bf72bcfefbe779635104_JaffaCakes118
Files
-
a3ab88bf69a1bf72bcfefbe779635104_JaffaCakes118.exe windows:4 windows x86 arch:x86
a3c2398dbee3a781ff8730e1690d3789
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathCombineW
PathCompactPathA
PathCompactPathExA
PathCompactPathExW
PathCompactPathW
PathCreateFromUrlA
PathCreateFromUrlW
PathFileExistsA
PathFileExistsW
PathFindExtensionA
PathFindExtensionW
PathFindFileNameA
PathFindFileNameW
PathFindNextComponentA
PathFindNextComponentW
PathFindOnPathA
PathFindOnPathW
PathFindSuffixArrayA
PathFindSuffixArrayW
PathGetArgsA
PathGetArgsW
PathGetCharTypeA
PathGetCharTypeW
PathGetDriveNumberA
PathGetDriveNumberW
PathIsContentTypeA
PathIsContentTypeW
PathIsDirectoryA
PathIsDirectoryEmptyA
PathIsDirectoryEmptyW
PathIsDirectoryW
PathIsFileSpecA
PathIsFileSpecW
PathIsLFNFileSpecA
PathIsLFNFileSpecW
PathIsNetworkPathA
PathIsNetworkPathW
PathIsPrefixA
PathIsPrefixW
PathIsRelativeA
PathIsRelativeW
PathIsRootA
PathIsRootW
PathIsSameRootA
PathIsSameRootW
PathIsSystemFolderA
PathIsSystemFolderW
PathIsUNCA
PathIsUNCServerA
PathQuoteSpacesW
PathQuoteSpacesA
PathIsUNCServerShareA
PathIsUNCServerShareW
PathIsUNCServerW
PathIsUNCW
PathIsURLA
PathIsURLW
PathMakePrettyA
PathMakePrettyW
PathMakeSystemFolderA
PathParseIconLocationW
PathParseIconLocationA
PathMatchSpecW
PathMatchSpecA
PathMakeSystemFolderW
PathRelativePathToA
kernel32
SetLastError
TlsFree
DeleteCriticalSection
GetFileType
VirtualAlloc
TlsSetValue
DeleteTimerQueue
GetLastError
FindClose
FindFirstFileA
lstrcpyA
lstrlenA
GetPrivateProfileSectionA
FreeLibrary
GetProcAddress
LoadLibraryExA
GetPrivateProfileStringA
GetSystemDirectoryA
lstrcmpiA
CreateMutexA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetVersionExA
GetWindowsDirectoryA
OutputDebugStringA
lstrcmpA
lstrcpynA
GetSystemInfo
VirtualProtect
ReadFile
GetProcessHeap
SetEndOfFile
GetStartupInfoA
GetCommandLineA
GetLocalTime
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
GetLocaleInfoW
GlobalFree
MapViewOfFile
CreateFileMappingW
GetFileInformationByHandle
GlobalUnlock
GlobalLock
GetTimeFormatW
GetDateFormatW
GetUserDefaultLCID
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
SetFilePointer
CreateFileA
FlushFileBuffers
SetStdHandle
VirtualQuery
InterlockedExchange
RtlUnwind
InitializeCriticalSection
GetCPInfo
GetOEMCP
GetACP
LoadLibraryA
TlsGetValue
LeaveCriticalSection
EnterCriticalSection
CloseHandle
VirtualFree
HeapCreate
HeapDestroy
TlsAlloc
SetHandleCount
ole32
CoInitialize
advapi32
IsTextUnicode
RegCreateKeyW
RegQueryValueExW
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegQueryValueExA
RegSetValueExW
msvcrt
wcsncpy
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
winmm
mmioInstallIOProcA
winspool.drv
OpenPrinterW
ClosePrinter
comctl32
CreateStatusWindowW
setupapi
SetupFindFirstLineA
SetupGetLineTextA
SetupFindNextLine
SetupCloseInfFile
SetupOpenInfFileA
Sections
.code Size: 37KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 1B
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 1B
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 1B
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 1B
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 728B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 970B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ