Static task
static1
Behavioral task
behavioral1
Sample
3b4f1faa9c4906edac51b9eb10fb7512_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3b4f1faa9c4906edac51b9eb10fb7512_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3b4f1faa9c4906edac51b9eb10fb7512_JaffaCakes118
-
Size
98KB
-
MD5
3b4f1faa9c4906edac51b9eb10fb7512
-
SHA1
02bdbe4d3b27134ac7fc954c90f44514c7cb2d7c
-
SHA256
eb8ee4e449ad88b06f185228297b36fa51980de8e9377d2bc1623031d03abdee
-
SHA512
e37bf0d68cd0b3d488460b45c1d2b605880dfa216b864f8f337303deabb20bace17a898a4aa0957459d2340892b7e86d7819a1cdde0dce8d6074c5658eddbde4
-
SSDEEP
1536:U4mrWUHrzMsZ0nypsHGmM4SN0v6DcLXJQUB1z6bbQt+2i2u+DF/ytp:UrfrzMs2y4GuwATH5ta/4/k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b4f1faa9c4906edac51b9eb10fb7512_JaffaCakes118
Files
-
3b4f1faa9c4906edac51b9eb10fb7512_JaffaCakes118.exe windows:4 windows x86 arch:x86
f1e1e43e7697f50362aee441e478bce0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerInstallFileA
GetFileVersionInfoA
user32
MoveWindow
SetWindowLongW
EndPaint
EmptyClipboard
DestroyMenu
DrawTextA
IsZoomed
GetMenuStringA
WindowFromPoint
GetClassLongA
InsertMenuA
GetCursor
CharLowerBuffA
SystemParametersInfoA
GetWindow
RegisterClassA
GetCapture
UpdateWindow
EnumChildWindows
CreateIcon
GetMenuState
InvalidateRect
ShowWindow
CloseClipboard
GetClassNameA
OemToCharA
RegisterClipboardFormatA
LoadKeyboardLayoutA
GetWindowRect
OffsetRect
SendMessageA
GetActiveWindow
oleaut32
SafeArrayGetElement
SafeArrayGetUBound
OleLoadPicture
SysStringLen
RegisterTypeLib
GetErrorInfo
SysReAllocStringLen
SafeArrayPtrOfIndex
SysFreeString
SafeArrayUnaccessData
msvcrt
calloc
strcmp
pow
fabs
memcpy
cos
comdlg32
ChooseColorA
FindTextA
GetSaveFileNameA
GetFileTitleA
shell32
SHGetDiskFreeSpaceA
Shell_NotifyIconA
SHGetDesktopFolder
advapi32
RegCreateKeyExA
shlwapi
SHGetValueA
PathIsContentTypeA
PathGetCharTypeA
SHStrDupA
SHDeleteValueA
kernel32
LoadLibraryExA
GetVersion
GetCurrentProcess
FormatMessageA
GetCurrentThreadId
GetProcAddress
GetStringTypeA
GetSystemDefaultLangID
ReadFile
GetCurrentProcessId
FindResourceA
LocalReAlloc
GetEnvironmentStrings
VirtualAllocEx
WideCharToMultiByte
SetEndOfFile
GetCurrentThread
FreeResource
GetFullPathNameA
GetCommandLineA
SizeofResource
SetErrorMode
ExitThread
FindClose
GetUserDefaultLCID
FindFirstFileA
VirtualAlloc
GetACP
CreateFileA
Sleep
lstrcmpiA
GetLocalTime
GetStartupInfoA
CompareStringA
HeapFree
GetThreadLocale
SetThreadLocale
GetProcessHeap
HeapAlloc
SetHandleCount
LoadLibraryA
CloseHandle
SetEvent
lstrcpynA
DeleteCriticalSection
GetModuleHandleA
VirtualFree
EnterCriticalSection
Sections
CODE Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ