Static task
static1
Behavioral task
behavioral1
Sample
3c435c1f25a40e6c8d2ab56b932ba7ef_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3c435c1f25a40e6c8d2ab56b932ba7ef_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3c435c1f25a40e6c8d2ab56b932ba7ef_JaffaCakes118
-
Size
233KB
-
MD5
3c435c1f25a40e6c8d2ab56b932ba7ef
-
SHA1
52f8ae573440c780f46d8e01c186ab1cd49d0dc3
-
SHA256
1ad90aaa803bc7c8077916ad43f1a237ef581c7c0579d2f0af6632da2a4d784a
-
SHA512
7b01009f7ff2c00e358c282e3543e1037127beb8cbce386e8d843b56db46a792ee58b16a5abe21a47d329a30404a08d773ce4b66c2bb980031f28f83753d07a1
-
SSDEEP
6144:26QLrM9AHFC/TaERMCkhjYeix5eSUuSeY:5QgAI/TayR4Y/5eX9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c435c1f25a40e6c8d2ab56b932ba7ef_JaffaCakes118
Files
-
3c435c1f25a40e6c8d2ab56b932ba7ef_JaffaCakes118.exe windows:4 windows x86 arch:x86
75ed0791bd5a2e6a0561f67bbd39b15b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetLastError
CreateThread
GetModuleFileNameA
ExitThread
LeaveCriticalSection
EnterCriticalSection
GetTickCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetLocalTime
CloseHandle
WriteFile
CreateFileA
ReadFile
SetFilePointer
GetFileSize
GetSystemDirectoryA
MultiByteToWideChar
TransactNamedPipe
QueryPerformanceCounter
QueryPerformanceFrequency
ExitProcess
CreateProcessA
FindClose
FindNextFileA
FindFirstFileA
HeapFree
HeapAlloc
GetProcessHeap
FileTimeToSystemTime
FileTimeToLocalFileTime
VirtualQueryEx
ReadProcessMemory
GetSystemInfo
OpenProcess
FreeLibrary
GetEnvironmentVariableW
GetProcAddress
LoadLibraryA
GetTimeFormatA
GetDateFormatA
GetFileAttributesA
GetModuleHandleA
FormatMessageA
GlobalUnlock
GlobalLock
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SetFileTime
GetFileTime
ExpandEnvironmentStringsA
SetFileAttributesA
GetTempPathA
WideCharToMultiByte
GetComputerNameA
CopyFileA
GetCurrentProcess
TerminateProcess
TerminateThread
DeleteFileA
MoveFileA
GetCurrentProcessId
WaitForSingleObject
CreateMutexA
GetExitCodeProcess
PeekNamedPipe
DuplicateHandle
CreatePipe
SetConsoleCtrlHandler
GetLocaleInfoA
GetVersionExA
GetLogicalDrives
GenerateConsoleCtrlEvent
WaitForMultipleObjects
GlobalMemoryStatus
HeapReAlloc
RtlUnwind
GetCommandLineA
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetStdHandle
SetHandleCount
GetFileType
HeapSize
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
RaiseException
InitializeCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
SetStdHandle
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
SetEndOfFile
Sections
.text Size: 169KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 199KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ