Static task
static1
Behavioral task
behavioral1
Sample
a3cafe0eb190ff7776f2c667cc2376d8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a3cafe0eb190ff7776f2c667cc2376d8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a3cafe0eb190ff7776f2c667cc2376d8_JaffaCakes118
-
Size
384KB
-
MD5
a3cafe0eb190ff7776f2c667cc2376d8
-
SHA1
c24a2cf084f558d26d107d872800be972a9779de
-
SHA256
3d20c52ef36414432749b016a1a7745cab43ab17f209553252c9b43fed9d99e3
-
SHA512
eb91593182f0609fcf8d031813aae8d731546aeb04ba87ef2fcf7acb8cdcf5b4394587380b83ea8ddd0ded07138ff8ee3cac03f908da02050154091f4acba4b7
-
SSDEEP
6144:8Zuo4VXdsr15N1111111VD111111111111111111111111111111111UNNQOrL8r:8ZeVNsr15N1111111VD111111111111L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a3cafe0eb190ff7776f2c667cc2376d8_JaffaCakes118
Files
-
a3cafe0eb190ff7776f2c667cc2376d8_JaffaCakes118.exe windows:4 windows x86 arch:x86
a82a23e8fcbf8f0178b1396b23fd468d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetCurrentThread
FindClose
GetProcAddress
GetModuleHandleA
GetLastError
HeapFree
HeapAlloc
lstrcatA
HeapCreate
GlobalLock
HeapLock
LocalSize
SetFilePointer
VirtualQuery
VirtualAlloc
PulseEvent
OpenMutexA
GetCurrentProcess
GetSystemTime
VirtualProtect
RtlUnwind
LockFile
ReadFile
UnlockFile
WriteFile
CloseHandle
VirtualProtectEx
GetSystemInfo
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
TerminateProcess
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
SetLastError
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
VirtualFree
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
user32
BeginPaint
DestroyWindow
wsprintfA
GetSysColorBrush
GetWindow
gdi32
CreateBrushIndirect
CreateDIBPatternBrush
SelectObject
advapi32
ConvertSidToStringSidW
ConvertStringSidToSidW
msvfw32
ICOpen
DrawDibTime
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 228KB - Virtual size: 631KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ