Static task
static1
Behavioral task
behavioral1
Sample
3ca5bc00278f803ce47b29443d01a72c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
3ca5bc00278f803ce47b29443d01a72c_JaffaCakes118
-
Size
181KB
-
MD5
3ca5bc00278f803ce47b29443d01a72c
-
SHA1
adaac803706194a3eb131d4961be52799c4c83ac
-
SHA256
91258e920a034db0c184b891e95db386832e3d90a97ed8ad310a1591ff9a4c2b
-
SHA512
99bda22c278bf7cf14da45ae8b9f1f51417b89f2fc085598decc8db8db3430a5fd7dfcce0c3e40e4c3b25d03606a18ede0ca5eeb317753d8add0d0e96db91a7e
-
SSDEEP
3072:bhK/SFqLl6FJQOr+y7pSWl3TGE4YMCV1EpvUzvXt1USJ3oF8xiN:bhUSFqQUE8Wl3j4Yxep0XtqeY8xiN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ca5bc00278f803ce47b29443d01a72c_JaffaCakes118
Files
-
3ca5bc00278f803ce47b29443d01a72c_JaffaCakes118.exe windows:4 windows x86 arch:x86
bdea1d619c0f5736281df2dfee8ebf3e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DefWindowProcA
SetWindowLongA
GetSysColor
GetClassLongA
GetActiveWindow
GetMenuItemCount
GetClientRect
GetScrollRange
ShowWindow
GetMenuStringA
GetFocus
GetDesktopWindow
GetPropA
kernel32
ExitThread
GetVersion
LoadLibraryExA
SizeofResource
Sleep
HeapFree
GetStdHandle
GlobalDeleteAtom
GetCurrentThreadId
GetEnvironmentStrings
InitializeCriticalSection
GetCPInfo
WriteFile
lstrcpynA
RaiseException
MoveFileExA
SetFilePointer
GetStringTypeW
GetOEMCP
GetCurrentProcess
FreeLibrary
CloseHandle
WaitForSingleObject
GetStartupInfoA
MoveFileA
GetTickCount
DeleteFileA
LockResource
GetACP
MulDiv
lstrcmpiA
GetFileSize
GetUserDefaultLCID
DeleteCriticalSection
SetErrorMode
FindClose
lstrcpyA
GetStringTypeA
GetFileType
FormatMessageA
GlobalAddAtomA
GetCurrentProcessId
GlobalFindAtomA
GetLastError
GetVersionExA
GetCurrentThread
EnterCriticalSection
LocalFree
ExitProcess
EnumCalendarInfoA
VirtualQuery
HeapDestroy
VirtualAllocEx
GetDateFormatA
SetThreadLocale
CreateThread
lstrcmpA
VirtualFree
CompareStringA
ReadFile
GetProcessHeap
CreateEventA
lstrlenA
WideCharToMultiByte
FindFirstFileA
lstrcatA
GetDiskFreeSpaceA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
GetThreadLocale
GetProcAddress
GetModuleHandleA
SetEvent
LoadResource
CreateFileA
LoadLibraryA
GetFileAttributesA
LocalAlloc
FreeResource
VirtualAlloc
GlobalAlloc
LocalReAlloc
FindResourceA
HeapAlloc
GetFullPathNameA
GetLocalTime
SetHandleCount
msvcrt
pow
strlen
calloc
_acmdln
tolower
log10
fabs
strcmp
memcpy
Sections
CODE Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 512B - Virtual size: 342B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.3rdata Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE