Static task
static1
Behavioral task
behavioral1
Sample
3a29fb4f442a764fd416e19567df9973_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3a29fb4f442a764fd416e19567df9973_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3a29fb4f442a764fd416e19567df9973_JaffaCakes118
-
Size
116KB
-
MD5
3a29fb4f442a764fd416e19567df9973
-
SHA1
5cb681dd5b707174a1906872dbdef7d7ec75aa6b
-
SHA256
0dbed061289b0d4bc0455bdf9e825c51bc1f523323a4ba6fb8b26902f91d476d
-
SHA512
8d20c82fa0921e16147fbb61f4395936888e86759dadb823a3937a5216cd3325a59e89371329b27ad9c704d5941d840a5ddaa72335f567b5fb135950e68fcb43
-
SSDEEP
3072:jH47ZFnDSc9784EDl0dBNSaTO2ij6dpF7T:r2POcl8BDlmBNSaqIH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a29fb4f442a764fd416e19567df9973_JaffaCakes118
Files
-
3a29fb4f442a764fd416e19567df9973_JaffaCakes118.exe windows:55401 windows x86 arch:x86
6b25ac484f186106f886a52fbab78d5c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
DragQueryFileW
SHGetDesktopFolder
DragQueryFileW
SHGetSpecialFolderPathW
Shell_NotifyIconW
DragAcceptFiles
SHGetFolderPathW
advapi32
RegOpenKeyW
AddAccessAllowedAce
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
RegDeleteKeyW
RegEnumValueW
gdi32
CreateSolidBrush
CreateCompatibleDC
MoveToEx
SetBkColor
BitBlt
user32
SystemParametersInfoW
PtInRect
IsIconic
ShowWindow
SetRect
GetWindowLongW
PostMessageW
ReleaseDC
kernel32
GetModuleHandleA
GetCurrentProcessId
VirtualAlloc
LoadLibraryA
ExitProcess
WaitForSingleObject
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 97KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ