Static task
static1
Behavioral task
behavioral1
Sample
3716ab404d540f6fbceef74b29840b2f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3716ab404d540f6fbceef74b29840b2f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3716ab404d540f6fbceef74b29840b2f_JaffaCakes118
-
Size
255KB
-
MD5
3716ab404d540f6fbceef74b29840b2f
-
SHA1
3b04c263a2e68365bab7fb2695a22f6f0749f3dd
-
SHA256
ef709b7a27b79aab916dcbdb51c62f16d18c3254ce958510e4e3c4858cc23e4f
-
SHA512
74a91a759330dfd07cfecaac3b5f209d57f8faa797cac0c9dbf95722a23872e3ac4202cd15c5324a7941b952ae4dce95f58744e9665e7f4c0a2defd920bbae99
-
SSDEEP
6144:FQJ87YaBvTUUQz8Az18QuggUhwiv4J2kyV0h7bb8r8:F77YqvAUq8SgUhgRD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3716ab404d540f6fbceef74b29840b2f_JaffaCakes118
Files
-
3716ab404d540f6fbceef74b29840b2f_JaffaCakes118.exe windows:4 windows x86 arch:x86
069ec14247e62dd0c047e11ecd28e3d8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
PulseEvent
lstrcpyA
lstrlenA
VirtualFree
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceExA
GetLastError
VirtualProtect
GetModuleHandleA
DeleteFileA
ReadFile
CreateFileA
HeapAlloc
GetSystemInfo
VirtualAlloc
LocalAlloc
InterlockedDecrement
GlobalFree
WriteFile
GlobalAlloc
LoadLibraryA
SystemTimeToFileTime
GetSystemTime
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
GetStartupInfoA
DebugBreak
HeapReAlloc
HeapFree
GetModuleFileNameA
VirtualQuery
LoadLibraryW
GetProcAddress
SetEvent
FreeLibrary
ExitProcess
GetCommandLineA
GetCurrentThreadId
lstrcmpiA
Sleep
CreateEventA
CreateThread
WaitForSingleObject
CloseHandle
HeapCreate
user32
GetDesktopWindow
TranslateAcceleratorA
LoadAcceleratorsA
LoadStringA
RegisterClassExA
LoadCursorA
LoadIconA
UpdateWindow
ShowWindow
CreateWindowExA
PostQuitMessage
EndPaint
DrawTextA
BeginPaint
IsWindow
DialogBoxParamA
EndDialog
UnregisterClassA
PeekMessageA
TranslateMessage
PostMessageA
GetDC
FillRect
ReleaseDC
GetClientRect
RegisterClassA
BringWindowToTop
DefWindowProcA
GetMessageA
IsWindowVisible
IsRectEmpty
DestroyWindow
SetRect
DispatchMessageA
CharNextA
PostThreadMessageA
AttachThreadInput
gdi32
Rectangle
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
GetDIBits
SetROP2
GetObjectA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
VariantClear
VariantInit
atl
ord57
ord21
ord16
ord23
ord17
ord20
ord18
pdh
PdhGetLogFileSize
PdhGetDataSourceTimeRangeW
wininet
InternetCloseHandle
InternetOpenW
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 217KB - Virtual size: 829KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sls Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE