Static task
static1
Behavioral task
behavioral1
Sample
3c876c3d767c02aef153dd373cdbcfb9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3c876c3d767c02aef153dd373cdbcfb9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3c876c3d767c02aef153dd373cdbcfb9_JaffaCakes118
-
Size
172KB
-
MD5
3c876c3d767c02aef153dd373cdbcfb9
-
SHA1
da0721d72fc2d87e69867ce58e2df3d598b7bbf7
-
SHA256
b92258cb1b8317c8f2d9422dfd0e9a5ad991b78d70aea121c694357f6e173bb0
-
SHA512
086f857f4d152021cd8b02fabc536d12e46666ed41b58786e233461251709e76f2467aeb0c6368de9d9ad6e382c89a396e76fc0265ebb5fe263daa408292b079
-
SSDEEP
3072:grOg+QD+tItk9PXNsBcecK0U7s6zk6o3DTrZCqUDucWmCUe4jed:grl+XtrfUc6bi33gqDy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c876c3d767c02aef153dd373cdbcfb9_JaffaCakes118
Files
-
3c876c3d767c02aef153dd373cdbcfb9_JaffaCakes118.exe windows:4 windows x86 arch:x86
dd7e9983638c31c295285ec56d3cea37
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapQueryInformation
WriteConsoleOutputA
VerifyVersionInfoA
WritePrivateProfileSectionA
OpenJobObjectA
SetConsoleHardwareState
OpenEventA
GetThreadTimes
RemoveDirectoryA
TermsrvAppInstallMode
GetConsoleAliasExesLengthA
SetConsoleCtrlHandler
GetThreadContext
GetFileSize
GetExitCodeProcess
GetLocalTime
GetDriveTypeA
SetFileShortNameA
GetVolumePathNamesForVolumeNameA
OutputDebugStringA
QueryPerformanceFrequency
MulDiv
SetProcessPriorityBoost
GetPrivateProfileSectionNamesW
GetLogicalDriveStringsA
LocalAlloc
SetThreadAffinityMask
CreateFileA
SetHandleContext
SetEnvironmentVariableA
GlobalLock
CreateSemaphoreA
GetModuleHandleA
ReadConsoleA
LZCloseFile
IsProcessorFeaturePresent
EnumSystemLanguageGroupsA
CreateEventA
CreateWaitableTimerA
ConnectNamedPipe
SetFileAttributesA
GetCompressedFileSizeA
GetEnvironmentVariableA
GetConsoleScreenBufferInfo
HeapAlloc
SetUnhandledExceptionFilter
GetFileAttributesExA
VirtualAllocEx
RegisterWaitForSingleObjectEx
IsValidLocale
CreateTimerQueue
GetCPInfoExA
GetConsoleFontInfo
OpenFileMappingA
Toolhelp32ReadProcessMemory
GetCurrentDirectoryA
HeapReAlloc
SetCurrentDirectoryA
ReadConsoleInputA
GetProcessId
FindClose
SetCommConfig
SetHandleInformation
SetVolumeMountPointA
EnumTimeFormatsA
GetFileSizeEx
SetEvent
GetSystemWindowsDirectoryA
WriteConsoleOutputCharacterA
GetFileType
GetSystemTimeAsFileTime
GetCurrentDirectoryA
GetWindowsDirectoryA
ReadConsoleOutputA
HeapReAlloc
OpenThread
GetVersion
GetTickCount
WriteConsoleOutputAttribute
OpenMutexA
GetCommModemStatus
EnumUILanguagesA
SetConsoleLocalEUDC
SetUserGeoID
MoveFileWithProgressA
QueryDosDeviceA
ReplaceFileA
GetLocaleInfoA
winmm
timeGetSystemTime
user32
SetProcessDefaultLayout
CreateDialogParamA
MonitorFromWindow
OpenClipboard
RedrawWindow
SwapMouseButton
SendMessageTimeoutA
FindWindowExA
IsWinEventHookInstalled
ChangeMenuA
CharUpperBuffW
MonitorFromWindow
DlgDirListComboBoxW
PrivateExtractIconExA
InSendMessage
GetMonitorInfoA
EnumPropsExW
SetDoubleClickTime
SetMenuContextHelpId
GetRawInputDeviceInfoA
TranslateAcceleratorA
ModifyMenuA
ShowWindowAsync
OpenWindowStationA
CreateIconFromResource
SendInput
GetMenuInfo
IsChild
CreateDialogIndirectParamA
GetMenuContextHelpId
SetClipboardData
SetWindowStationUser
SetMenuItemInfoA
ShowStartGlass
LoadMenuA
IsCharAlphaNumericW
GetWindowDC
GetScrollRange
EnumWindows
DragDetect
IntersectRect
LoadImageA
DrawTextExA
EndTask
ReplyMessage
ToUnicodeEx
SetFocus
DrawTextA
TranslateAcceleratorA
PostThreadMessageA
CharToOemBuffA
IsChild
GetMessageExtraInfo
GetWindowTextA
GetWindowTextA
DestroyWindow
IsWindowUnicode
IsWindowInDestroy
SetSysColors
TranslateMessageEx
CreateWindowStationW
DlgDirSelectExA
SetWindowTextA
TrackPopupMenu
GetClassWord
SetProcessDefaultLayout
GetMenuItemCount
MessageBoxExA
SetLayeredWindowAttributes
GetRawInputDeviceList
SetPropA
LockWindowStation
EditWndProc
EnumPropsExA
MonitorFromWindow
EnumPropsExA
IsDialogMessage
IsWindowInDestroy
ToAsciiEx
RegisterClassExA
DlgDirSelectComboBoxExA
SendMessageTimeoutA
ModifyMenuA
DrawFrame
IsWindowEnabled
EndDeferWindowPos
Sections
.idata Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.itext Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ