Static task
static1
Behavioral task
behavioral1
Sample
3b67975c0b6209b25bc48e6723f58950_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3b67975c0b6209b25bc48e6723f58950_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3b67975c0b6209b25bc48e6723f58950_JaffaCakes118
-
Size
168KB
-
MD5
3b67975c0b6209b25bc48e6723f58950
-
SHA1
5baa584f86c13a5cefa05fc89ad6f06b57d1ce6a
-
SHA256
a006cec7db8115817a1e46eac1ca8af6df41552db6a00c36822bb550e44d69c2
-
SHA512
555356c7084e3c1f4f5db18fb63a43ca66ecf4560e0ec85fe116694006ad38f067f958193918a6c032d415047a9fdc21f0cd3003b2156390f3ba9e8dcd3bc244
-
SSDEEP
3072:KYZC5kXAwkzvY18sL84ot7fj+6gDE6EyuLclTHw4a4oYEtrB:7CeXAzvY18sLtotLj+6gIRebVasIr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b67975c0b6209b25bc48e6723f58950_JaffaCakes118
Files
-
3b67975c0b6209b25bc48e6723f58950_JaffaCakes118.exe windows:4 windows x86 arch:x86
504feadbb61109b1a6f93e541c7e2d93
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
InterlockedDecrement
CreateSemaphoreA
ReleaseSemaphore
GetCurrentThreadId
EnterCriticalSection
CreateThread
GetExitCodeThread
LocalAlloc
WaitForMultipleObjects
lstrlenA
InterlockedIncrement
SetEvent
WaitForSingleObject
CreateEventA
OpenEventA
ResetEvent
SetLastError
GlobalFree
GetVersionExA
GetLastError
GetProcAddress
LoadLibraryA
InitializeCriticalSection
IsBadWritePtr
IsBadReadPtr
OutputDebugStringA
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
GetComputerNameA
GlobalAlloc
GetSystemDirectoryA
LocalFree
TerminateThread
Sleep
GetCommandLineA
GetEnvironmentVariableA
LCMapStringA
HeapSize
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
RaiseException
DeviceIoControl
FlushFileBuffers
GetStringTypeW
GetStringTypeA
IsBadCodePtr
SetUnhandledExceptionFilter
SetEndOfFile
FreeEnvironmentStringsW
CloseHandle
FreeLibrary
FreeEnvironmentStringsA
DeleteCriticalSection
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
SetStdHandle
SetFilePointer
ReadFile
HeapAlloc
GetModuleFileNameA
HeapFree
GetModuleHandleA
GetACP
GetCPInfo
GetOEMCP
TlsGetValue
LCMapStringW
UnhandledExceptionFilter
GetStartupInfoA
TlsAlloc
WriteFile
GetFileType
RtlUnwind
ResumeThread
TlsSetValue
ExitThread
HeapDestroy
GetFileAttributesA
CreateFileA
TerminateProcess
GetVersion
ExitProcess
GetCurrentProcess
user32
GetDC
ShowWindow
SetWindowTextA
SetFocus
EnableWindow
GetDlgItem
ReleaseDC
wsprintfA
SetDlgItemTextA
LoadStringA
GetWindowTextA
EndDialog
LoadBitmapA
GetDesktopWindow
DialogBoxParamA
RegisterWindowMessageA
GetWindowRect
IsDlgButtonChecked
SetWindowPos
GetSysColor
gdi32
CreateSolidBrush
SelectObject
Rectangle
DeleteObject
BitBlt
CreateCompatibleDC
SetBkColor
CreateBitmap
GetDeviceCaps
GetObjectA
GetPixel
CreatePen
DeleteDC
winspool.drv
EnumPrintersA
EnumPortsA
GetPrinterDriverA
GetPrinterDriverDirectoryA
GetPrinterA
SetPrinterDataA
OpenPrinterA
EnumJobsA
GetJobA
GetPrinterDataA
SetPrinterA
SetJobA
ClosePrinter
advapi32
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegQueryValueExA
RegDeleteKeyA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegFlushKey
RegQueryInfoKeyA
RegEnumKeyA
RegEnumKeyW
RegEnumValueA
RegEnumValueW
ole32
CoUninitialize
CoInitialize
oleaut32
SysFreeString
SafeArrayGetLBound
SysAllocString
SysAllocStringByteLen
SafeArrayUnaccessData
LoadRegTypeLi
SafeArrayAccessData
SafeArrayCreate
VariantInit
SafeArrayPutElement
SysAllocStringLen
SysStringLen
VariantClear
SafeArrayGetUBound
Sections
.text Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE