Static task
static1
Behavioral task
behavioral1
Sample
3b13e053d62f1b7c8c15b735cbb26b05_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3b13e053d62f1b7c8c15b735cbb26b05_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3b13e053d62f1b7c8c15b735cbb26b05_JaffaCakes118
-
Size
256KB
-
MD5
3b13e053d62f1b7c8c15b735cbb26b05
-
SHA1
7ae397d99b0ec078eeb71a0294d6d4dcfb64c738
-
SHA256
9f98cb284f5fba0bc78a2370aedcaa9e152c190bdd4b178872323ea08e7a37cc
-
SHA512
4d56a00de0057815744089062f994e9918f3fbe31b70b1489b4e9fd11e148e0ed6e5766db00d918d103a05ac662b1ee8150a1aaefaec99e283b88e57c6837c75
-
SSDEEP
6144:4viw92I4nsONQzr9o2lZogx2XepKKZJlLQci0Js2Ih/:4vi0AsON6r93Z3kr2+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b13e053d62f1b7c8c15b735cbb26b05_JaffaCakes118
Files
-
3b13e053d62f1b7c8c15b735cbb26b05_JaffaCakes118.exe windows:5 windows x86 arch:x86
cff29cc3b2db8332ae88760618a7e7dd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadResource
GetLastError
VirtualProtect
VirtualFree
FreeLibrary
LoadLibraryW
CloseHandle
Sleep
GetModuleHandleA
LockResource
FindResourceExW
CreateEventW
FreeResource
VirtualAlloc
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetLocaleInfoA
HeapSize
IsValidCodePage
GetOEMCP
GetACP
LoadLibraryA
ExitProcess
GetCPInfo
InitializeCriticalSectionAndSpinCount
RtlUnwind
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
HeapFree
SetUnhandledExceptionFilter
GetModuleHandleW
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
user32
GetClientRect
RegisterClassA
BringWindowToTop
FillRect
ReleaseDC
PostMessageA
DispatchMessageA
TranslateMessage
PeekMessageA
UnregisterClassA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
oleaut32
VariantInit
VariantClear
gdi32
SelectObject
CreateCompatibleDC
pdh
PdhConnectMachineW
PdhCollectQueryData
PdhGetCounterInfoW
PdhComputeCounterStatistics
PdhEnumObjectItemsHW
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 350KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 2KB - Virtual size: 340KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE