Static task
static1
Behavioral task
behavioral1
Sample
3938e4e0770ade3210386a70f366d839_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3938e4e0770ade3210386a70f366d839_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3938e4e0770ade3210386a70f366d839_JaffaCakes118
-
Size
348KB
-
MD5
3938e4e0770ade3210386a70f366d839
-
SHA1
bae1771e048972aeda42b56426337ca24a335c8f
-
SHA256
61af578b25c35a82ae8fcda14d40a06287972838b6077d3b48b119be2dd8ea78
-
SHA512
425e7659455d66d1a206afa392c93eb7ecbdb004db234ddd160f41048286365e7ee44203a74156c507681daa2c7300aadea81de7a7d5135179652e2b2c9a1839
-
SSDEEP
6144:HtaqSM4bmGY/mFishPWGovc1PqXcfxkdOv+lNuaLPkHYO6T:/SM4aGYecshwc1+cZV+lR7k4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3938e4e0770ade3210386a70f366d839_JaffaCakes118
Files
-
3938e4e0770ade3210386a70f366d839_JaffaCakes118.exe windows:4 windows x86 arch:x86
7673d58e9878a269c2fe3ec6172ec893
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
shell32
ShellExecuteW
ShellExecuteExW
kernel32
FileTimeToLocalFileTime
FileTimeToSystemTime
FormatMessageW
GetComputerNameW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetSystemTimeAsFileTime
GetSystemWindowsDirectoryW
GetTickCount
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsBadReadPtr
LoadLibraryA
LoadLibraryW
LocalAlloc
LocalFree
LocalReAlloc
MultiByteToWideChar
OutputDebugStringA
DisableThreadLibraryCalls
QueryPerformanceCounter
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
WideCharToMultiByte
WriteFile
lstrcmpiW
lstrcpyW
lstrlenW
CloseHandle
CreateFileW
DeleteCriticalSection
OutputDebugStringW
user32
GetWindowLongW
InsertMenuItemW
LoadBitmapW
LoadCursorW
LoadIconW
LoadImageW
LoadStringW
MessageBoxW
PostMessageW
RegisterClipboardFormatW
ReleaseDC
SendDlgItemMessageW
GetParent
SetCursor
SetDlgItemTextW
SetFocus
SetWindowLongW
SetWindowTextW
SystemParametersInfoW
WinHelpW
wsprintfW
EndDialog
EnableWindow
DialogBoxParamW
GetDlgItemTextA
GetDlgItem
SendMessageW
GetDC
comctl32
PropertySheetW
CreatePropertySheetPageW
crypt32
CertDuplicateCertificateContext
CertDuplicateStore
CertEnumCertificatesInStore
CertEnumSystemStore
CertFindCRLInStore
CertFreeCRLContext
CertFreeCertificateContext
CertGetCertificateContextProperty
CertGetEnhancedKeyUsage
CertGetNameStringW
CertOpenStore
CertSaveStore
CryptDecodeObject
CryptEncodeObject
CryptEnumOIDInfo
CryptFindOIDInfo
CryptQueryObject
CertDeleteCertificateFromStore
CertControlStore
CertCloseStore
CertAddCertificateContextToStore
gdi32
GetDeviceCaps
DeleteObject
CreateFontIndirectW
rpcrt4
UuidCreate
UuidToStringW
RpcStringFreeW
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE