Static task
static1
Behavioral task
behavioral1
Sample
3a5ef7f3d801a3d8c5885d7e45fbbfb4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3a5ef7f3d801a3d8c5885d7e45fbbfb4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3a5ef7f3d801a3d8c5885d7e45fbbfb4_JaffaCakes118
-
Size
4.2MB
-
MD5
3a5ef7f3d801a3d8c5885d7e45fbbfb4
-
SHA1
809779247e1fee4525c7eaa5721fda779570d9fb
-
SHA256
614a6e72d2e7078d01b0a1bdb75e0e28cd7bcfbaf6d16d9d8dab57d163c6c1a0
-
SHA512
364c78e1410213be65b2b376ff12df32064558ea98cf8affe13e49e1e862d9bfe511b77bbd78c5f0711d0503090f733244581f72f9a52853e62017dd9b446e1b
-
SSDEEP
98304:Nq1+wRP1lVitll0h1dlWmkzydlcUx9giOw2iWtG0BWDMd7k/mAoY4t3Gs6a//Jfs:pwRP1lgPl0h1dNkzydlcUx9giOw2iWtG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a5ef7f3d801a3d8c5885d7e45fbbfb4_JaffaCakes118
Files
-
3a5ef7f3d801a3d8c5885d7e45fbbfb4_JaffaCakes118.exe windows:4 windows x86 arch:x86
86cf9c5fe7575b03fdb99ed06c05dad4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetReadFile
InternetOpenUrlW
HttpQueryInfoW
InternetCloseHandle
InternetOpenW
InternetSetOptionW
kernel32
DeleteFileW
GetModuleFileNameA
CreateFileA
GetFileSize
SetFilePointer
ReadFile
GetCurrentThread
FreeLibrary
GetModuleFileNameW
SetLastError
CreateFileW
WriteFile
LoadLibraryA
GetProcAddress
GetModuleHandleA
VirtualProtect
GetCurrentProcess
GetPrivateProfileStringW
WritePrivateProfileStringW
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
lstrlenA
LoadResource
LockResource
SizeofResource
FindResourceW
FindResourceExW
GetACP
FormatMessageW
GetTickCount
Sleep
GetThreadContext
SetThreadContext
VirtualQuery
InterlockedCompareExchange
VirtualFree
FlushInstructionCache
VirtualAlloc
GetCurrentThreadId
SuspendThread
ResumeThread
GetModuleHandleW
SetEndOfFile
CreateDirectoryW
GetFileAttributesW
WaitForSingleObject
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
IsValidCodePage
GetOEMCP
GetFileType
SetHandleCount
HeapReAlloc
HeapCreate
HeapDestroy
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetStdHandle
HeapSize
TlsFree
TlsSetValue
OutputDebugStringW
CreateProcessW
GetTempFileNameW
GetTempPathW
CloseHandle
OpenMutexW
CreateMutexW
GetLastError
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetThreadLocale
GetLocaleInfoW
TlsAlloc
TlsGetValue
ExitProcess
GetCPInfo
LCMapStringW
LCMapStringA
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCommandLineA
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
RaiseException
RtlUnwind
user32
UnregisterClassA
CreateWindowExW
RegisterClassW
LoadCursorW
LoadIconW
DefWindowProcW
SetForegroundWindow
SetWindowPos
IsZoomed
AttachThreadInput
GetWindowThreadProcessId
ShowWindow
IsWindowVisible
GetForegroundWindow
IsWindow
MessageBoxW
PostQuitMessage
gdi32
GetStockObject
advapi32
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegCloseKey
RegEnumValueW
RegQueryValueExW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegEnumKeyExW
shell32
SHGetFolderPathW
shlwapi
PathFileExistsW
Sections
.text Size: 229KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gms Size: 512B - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.APP Size: 3.9MB - Virtual size: 4.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ