Static task
static1
Behavioral task
behavioral1
Sample
3b750c8951bab7bce9b609740b5eb5ed_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3b750c8951bab7bce9b609740b5eb5ed_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3b750c8951bab7bce9b609740b5eb5ed_JaffaCakes118
-
Size
73KB
-
MD5
3b750c8951bab7bce9b609740b5eb5ed
-
SHA1
f91bd48fa4ad537299f2937e769880691787dba8
-
SHA256
70eb1bbbbe2434192482a5e679084644af983bb44844009eefd8ca265952379b
-
SHA512
3628c684db52a4fd38b7a3fafe065094824ef91aaf62e0ba5e5f038ce38bc3fd13cf0f2606f3df84cd07c6e6adeb7d960f4d4e9d8287682a96ce8b6476b43501
-
SSDEEP
768:h7vT483Y/y34N9sWzXKspxdvv00EIOSMTYGKtWvo5c+p4mC:h7kuOO4HLK0TOSM0Gfof+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b750c8951bab7bce9b609740b5eb5ed_JaffaCakes118
Files
-
3b750c8951bab7bce9b609740b5eb5ed_JaffaCakes118.exe windows:4 windows x86 arch:x86
a0b1f29fc22c48d17a62790069496291
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetSystemMetrics
wsprintfA
kernel32
Process32Next
lstrcpynA
CloseHandle
CreateFileA
CreateProcessA
DeleteFileA
ExitProcess
GetCurrentProcess
GetCurrentProcessId
GetEnvironmentVariableA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetShortPathNameA
GetSystemDirectoryA
GetTempPathA
LoadLibraryA
lstrcpyA
ReadFile
ResumeThread
RtlZeroMemory
SetFileAttributesA
SetFilePointer
SetPriorityClass
Sleep
VirtualAllocEx
WaitForSingleObject
WriteFile
lstrcatA
lstrcmpA
lstrcmpiA
lstrlenA
shlwapi
StrStrA
Sections
.text Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 858B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ