Static task
static1
Behavioral task
behavioral1
Sample
3cabf857cc0539b988e71da6d88d7d47_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3cabf857cc0539b988e71da6d88d7d47_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3cabf857cc0539b988e71da6d88d7d47_JaffaCakes118
-
Size
167KB
-
MD5
3cabf857cc0539b988e71da6d88d7d47
-
SHA1
79418a85ac89bc4e42447403f4328794dd16f964
-
SHA256
1dc374bf23006ca80929a964d0472aa9c4207b3c8a1e10f3ca0b8c57d4ea7a87
-
SHA512
d6be2e6565a5b1b2bf0d4bb83966c4288035603432677368103ce753f603ec01a11557b82675cd47ef98f6a9c18e6d406784f02e7c79d837a38c3441eae736e0
-
SSDEEP
3072:bX+z1m9yVP5i0JlRgLxBkfN1Q+uzPL1Eul7mlrNlW:bXsU01c0cBkfNSTtQB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3cabf857cc0539b988e71da6d88d7d47_JaffaCakes118
Files
-
3cabf857cc0539b988e71da6d88d7d47_JaffaCakes118.exe windows:4 windows x86 arch:x86
e6e4dd2162dd9b716548f112dbf020aa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetScrollPos
PeekMessageA
ReleaseDC
TranslateMessage
PeekMessageW
GetIconInfo
LoadCursorA
GetMessagePos
MessageBoxA
DispatchMessageA
DrawEdge
GetKeyState
DispatchMessageW
ClientToScreen
LoadStringA
SetPropA
DrawIconEx
MapWindowPoints
CharUpperBuffA
CharToOemA
GetKeyNameTextA
ChildWindowFromPoint
GetCapture
MapVirtualKeyA
GetKeyboardLayoutList
TrackPopupMenu
DefMDIChildProcA
CallWindowProcA
CreateIcon
SetMenu
EnableWindow
EnumChildWindows
DestroyIcon
DefFrameProcA
CharLowerBuffA
InsertMenuA
IntersectRect
ShowOwnedPopups
GetSysColorBrush
ReleaseCapture
SetClassLongA
IsWindow
OpenClipboard
GetKeyboardLayoutNameA
GetClassNameA
DeleteMenu
RemovePropA
GetKeyboardType
SetWindowLongA
DrawIcon
IsRectEmpty
UpdateWindow
MsgWaitForMultipleObjects
IsDialogMessageW
LoadKeyboardLayoutA
GetSystemMetrics
IsChild
GetClassLongA
SetCursor
SetWindowLongW
SystemParametersInfoA
GetScrollInfo
MoveWindow
CloseClipboard
EqualRect
GetWindowTextA
CallNextHookEx
IsIconic
SetWindowPlacement
GetLastActivePopup
GetForegroundWindow
ShowWindow
GetDC
GetCursor
DestroyMenu
RemoveMenu
GetSystemMenu
GetWindowThreadProcessId
GetMenuItemInfoA
IsWindowEnabled
GetWindowRect
PostQuitMessage
UnregisterClassA
GetActiveWindow
CharNextW
SetActiveWindow
GetDCEx
OemToCharA
GetWindowLongW
SetClipboardData
SetMenuItemInfoA
GetSysColor
GetWindow
CharNextA
AdjustWindowRectEx
SetWindowTextA
ScrollWindow
SetForegroundWindow
SetWindowsHookExA
InflateRect
PostMessageA
GetTopWindow
SendMessageW
OffsetRect
LoadIconA
WindowFromPoint
SetFocus
IsWindowUnicode
GetFocus
KillTimer
EnableMenuItem
GetSubMenu
EndPaint
EnumThreadWindows
GetDesktopWindow
shlwapi
SHQueryValueExA
PathFileExistsA
PathIsDirectoryA
PathGetCharTypeA
SHDeleteValueA
SHEnumValueA
SHSetValueA
comdlg32
ChooseColorA
GetFileTitleA
GetSaveFileNameA
FindTextA
GetOpenFileNameA
oleaut32
SysFreeString
SysReAllocStringLen
SafeArrayCreate
SafeArrayUnaccessData
SysStringLen
OleLoadPicture
SafeArrayGetUBound
SysAllocStringLen
SafeArrayPtrOfIndex
VariantChangeType
VariantCopyInd
OleLoadPicture
GetErrorInfo
SafeArrayCreate
SafeArrayGetUBound
SafeArrayUnaccessData
RegisterTypeLib
SysReAllocStringLen
SafeArrayGetElement
VariantChangeType
advapi32
RegDeleteValueA
RegQueryValueA
RegLoadKeyA
version
VerQueryValueA
VerInstallFileA
gdi32
CreateBrushIndirect
SaveDC
CreateBitmap
CreateFontIndirectA
BitBlt
GetDCOrgEx
GetDIBits
LineTo
RestoreDC
CreateDIBSection
kernel32
GetCurrentProcess
GetModuleHandleA
ExitThread
ResetEvent
lstrcpynA
GetProcAddress
VirtualAlloc
lstrlenA
VirtualAllocEx
SetErrorMode
GetLocalTime
GetVersion
CloseHandle
LockResource
shell32
SHGetFileInfoA
SHGetSpecialFolderLocation
SHGetFolderPathA
SHGetDesktopFolder
Shell_NotifyIconA
comctl32
ImageList_Create
ImageList_Destroy
ImageList_Add
ImageList_GetBkColor
ImageList_DragShowNolock
ole32
CLSIDFromString
CoGetObjectContext
StgOpenStorage
CoDisconnectObject
CoCreateInstanceEx
MkParseDisplayName
OleCreateStaticFromData
ReleaseStgMedium
CoGetMalloc
Sections
CODE Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 349B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE