Static task
static1
Behavioral task
behavioral1
Sample
3816cc2b7b6588b04a433b025232a610_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3816cc2b7b6588b04a433b025232a610_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3816cc2b7b6588b04a433b025232a610_JaffaCakes118
-
Size
158KB
-
MD5
3816cc2b7b6588b04a433b025232a610
-
SHA1
8c285cfa0e4d613144e70f06a20649095b8f4e65
-
SHA256
be6e59fedd26aed8d0cca9c2b9057c99463cce43677e00936fd0ebf4b4c9aa76
-
SHA512
0ccdc87e989316df754178225468c94789fcc9ebd7bcbe18326c73b7723eaafe781914fd30144c5cb87134ddb7bac1d72cbfd47d60289372e3f71a4718e531c6
-
SSDEEP
3072:hZp3WE/de9nhDKIKJ/rRY5GOdiibDjW/Py/oMO2S2jbxWGq:hj1/09nhDK1J/FJyi6q/Py/RSbGq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3816cc2b7b6588b04a433b025232a610_JaffaCakes118
Files
-
3816cc2b7b6588b04a433b025232a610_JaffaCakes118.exe windows:4 windows x86 arch:x86
2682e104f0319a3d692597f88ae313b0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
VirtualAlloc
CreateFileA
GetLastError
DeviceIoControl
WaitForSingleObject
CreateEventA
lstrlenA
FormatMessageA
LocalFree
GetOverlappedResult
DuplicateHandle
OpenProcess
ExitProcess
GetModuleHandleA
GetCommandLineA
GetCommConfig
CloseHandle
GetTickCount
lstrcpyA
EnterCriticalSection
LoadLibraryExA
SetEvent
GetTempFileNameW
GetTempPathW
UnmapViewOfFile
GetModuleHandleW
CreateProcessW
GetModuleFileNameW
SetLastError
DeleteCriticalSection
lstrcpynW
CreateFileW
GetCommandLineW
SetUnhandledExceptionFilter
InitializeCriticalSection
CreateFileMappingW
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
GetStartupInfoA
GetProcAddress
LeaveCriticalSection
LoadLibraryW
MapViewOfFile
GetWindowsDirectoryW
GlobalFree
user32
LoadCursorW
LoadIconA
LoadIconW
FindWindowW
SetFocus
SetForegroundWindow
LoadStringW
MessageBoxW
ExitWindowsEx
gdi32
GetTextExtentPoint32A
DeleteObject
SelectObject
msvcrt
_except_handler3
_c_exit
_exit
_XcptFilter
_cexit
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_vsnwprintf
__set_app_type
_controlfp
advapi32
RegOpenKeyA
shell32
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetMalloc
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text2 Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data2 Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ