Static task
static1
Behavioral task
behavioral1
Sample
3ae5df4ec087be42f88226621b01b591_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ae5df4ec087be42f88226621b01b591_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3ae5df4ec087be42f88226621b01b591_JaffaCakes118
-
Size
170KB
-
MD5
3ae5df4ec087be42f88226621b01b591
-
SHA1
d67ab01491448beb5aee19a22a9dc59ff6f51423
-
SHA256
d3ca4e5e5b4eca0d9d3a0d3cca3570b8ecbf0c8535cc02e2ec7f25c4156fa026
-
SHA512
4aace0a964ca9798a69078fd370c33801650e493fd91f2bab54de432ba7242482a1a6845928e6130921070c77de433ee846e8c0b6ec2238e7375972065c63382
-
SSDEEP
3072:aI3hkNnLCMvk0H2/mhyYm9TXJ39diiyPbJbZn45M+u4Iw:Zt0WUGpiJbJba5M+uM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ae5df4ec087be42f88226621b01b591_JaffaCakes118
Files
-
3ae5df4ec087be42f88226621b01b591_JaffaCakes118.exe windows:4 windows x86 arch:x86
677bc82cacb6b3cc870442e1ea351a5d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
calloc
pow
memmove
strcmp
user32
SendMessageW
GetForegroundWindow
IsWindowUnicode
GetMenuItemCount
DeleteMenu
ActivateKeyboardLayout
GetClassInfoA
IsChild
GetWindowThreadProcessId
MapWindowPoints
RegisterClassA
SetScrollInfo
GetFocus
ChildWindowFromPoint
GetClassNameA
RedrawWindow
GetScrollInfo
ShowWindow
EnableWindow
KillTimer
GetScrollPos
GetKeyboardType
GetMenu
ReleaseCapture
ClientToScreen
GetKeyboardLayoutList
DrawTextA
CharUpperBuffA
CharNextA
GetKeyboardLayout
GetWindowPlacement
TranslateMessage
SetScrollPos
EmptyClipboard
GetKeyState
GetScrollRange
SetRect
GetMenuItemID
MessageBoxA
shell32
DragQueryFileA
SHGetDesktopFolder
SHFileOperationA
SHGetFolderPathA
SHGetSpecialFolderLocation
kernel32
LockResource
ResetEvent
GlobalAlloc
FindClose
ExitThread
GetCommandLineA
lstrcatA
GetSystemDefaultLangID
MoveFileA
GetLocaleInfoA
GetFileAttributesA
GetCPInfo
GetProcAddress
FormatMessageA
LoadLibraryA
WaitForSingleObject
lstrcpyA
SetEndOfFile
CreateThread
GetLocalTime
LoadResource
GetFullPathNameA
HeapAlloc
WideCharToMultiByte
HeapDestroy
MoveFileExA
GetFileType
SetFilePointer
lstrlenA
VirtualAllocEx
SetLastError
Sleep
ReadFile
GetModuleHandleA
SetHandleCount
InitializeCriticalSection
DeleteFileA
FreeLibrary
lstrcpynA
GlobalFindAtomA
CreateFileA
MulDiv
WriteFile
GetDiskFreeSpaceA
VirtualFree
RaiseException
GetOEMCP
GetCurrentProcessId
GetModuleFileNameA
shlwapi
SHQueryInfoKeyA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
comctl32
ImageList_DrawEx
comdlg32
GetSaveFileNameA
ChooseColorA
GetFileTitleA
GetOpenFileNameA
FindTextA
advapi32
RegQueryValueExA
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 478B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
BSS Size: 1024B - Virtual size: 735B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ