Static task
static1
Behavioral task
behavioral1
Sample
3b1ecbfcd9de228e13c27565e64739eb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3b1ecbfcd9de228e13c27565e64739eb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3b1ecbfcd9de228e13c27565e64739eb_JaffaCakes118
-
Size
49KB
-
MD5
3b1ecbfcd9de228e13c27565e64739eb
-
SHA1
a10c2560a088d9c7f6a9795934b8468d609085fb
-
SHA256
eb4e8536af6bfdf9550934663be9f6ce73d1ae152a48e56acd19a761b7ae5ae6
-
SHA512
6664a33cb339715031c2752f452b6d2e346333884ebf30b1048225ae182e5150dbdaae8709f342afdab21111802d067ee7a32d252cf3925389023a832d927148
-
SSDEEP
768:aK+do4CrsI6/csHOw+rH545WsH4Xms9+DYw1JG9qKvGAFgqd8G4N4mdS2:aKPuOwoZ45f4+DYqw9qSqwa4m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b1ecbfcd9de228e13c27565e64739eb_JaffaCakes118
Files
-
3b1ecbfcd9de228e13c27565e64739eb_JaffaCakes118.exe windows:5 windows x86 arch:x86
96e8f83e121e28b5c8cce7c347cfce41
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueA
InitializeSid
RegCloseKey
IsTextUnicode
RegDeleteValueA
IsValidSid
RegEnumValueA
RegFlushKey
IsValidAcl
ClearEventLogA
RegCreateKeyA
CreateServiceA
RegEnumKeyA
IsValidSecurityDescriptor
ControlService
certcli
CAEnumFirstCA
CACloseCA
CACloseCertType
CADeleteCA
shlwapi
UrlIsA
UrlCreateFromPathA
UrlHashA
UrlEscapeA
UrlCombineA
UrlCompareA
PathCommonPrefixA
UrlUnescapeA
UrlIsNoHistoryW
PathCombineA
PathCompactPathA
msimg32
GradientFill
vSetDdrawflag
TransparentBlt
DllInitialize
wtsapi32
WTSVirtualChannelWrite
WTSLogoffSession
WTSQueryUserToken
WTSSetUserConfigW
WTSVirtualChannelOpen
WTSFreeMemory
WTSVirtualChannelPurgeInput
WTSQuerySessionInformationA
WTSOpenServerW
WTSEnumerateServersA
WTSVirtualChannelClose
kernel32
GetGeoInfoA
GetPrivateProfileIntA
SetFilePointer
GetDateFormatA
GetPrivateProfileStructW
GetSystemTimeAsFileTime
CreateDirectoryA
CreateNamedPipeA
ReadConsoleA
VirtualAlloc
WriteConsoleA
ReadFile
GetProcessId
DeviceIoControl
CompareStringA
GetCurrentDirectoryA
FormatMessageA
GetConsoleTitleA
GetPrivateProfileStructW
GetTickCount
GetAtomNameA
WaitForSingleObject
lstrcpynA
GetTimeFormatA
HeapValidate
CloseHandle
GetConsoleAliasW
GetStringTypeA
GetModuleHandleA
GetCurrentProcess
GetProcessHeap
GetNumberFormatW
UpdateResourceA
GetComputerNameA
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 640B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ