Static task
static1
Behavioral task
behavioral1
Sample
3bb5958314bee503ca25c8c4cfd5ce17_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3bb5958314bee503ca25c8c4cfd5ce17_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3bb5958314bee503ca25c8c4cfd5ce17_JaffaCakes118
-
Size
116KB
-
MD5
3bb5958314bee503ca25c8c4cfd5ce17
-
SHA1
438268c278f28a3113bdd86a3af136ae9ecf4932
-
SHA256
a720faa43d831e22ee7ae9191354caed61b5966877098e07ad298264cfe411de
-
SHA512
4b92a4c26acc6a4fe767935cea54c476e07a3c46cb324aa8f942c2fab6437ea9eeec48992e79e0044d60203364ae7de5f5b9f553088c23d822a2a49bf1d1ab19
-
SSDEEP
3072:mttK4gBpFclyM6VRS1hmniy4JdEbgnwlVrgJjG8AHCPKyKSRmZFq:mttip2eRQhmn+JdEbgLTAiOkQF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3bb5958314bee503ca25c8c4cfd5ce17_JaffaCakes118
Files
-
3bb5958314bee503ca25c8c4cfd5ce17_JaffaCakes118.exe windows:4 windows x86 arch:x86
4fbc0ba2710f88897ec81926ce47e522
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
SHGetSpecialFolderPathW
SHFileOperationW
dinput
DirectInputCreateW
advapi32
GetSecurityDescriptorDacl
SetFileSecurityW
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
AddAccessAllowedAce
AddAce
AllocateAndInitializeSid
EqualSid
GetAce
GetAclInformation
GetFileSecurityW
GetLengthSid
GetSecurityDescriptorControl
RegEnumKeyA
GetTokenInformation
InitializeAcl
InitializeSecurityDescriptor
OpenProcessToken
RegCloseKey
SetSecurityDescriptorDacl
gdi32
GetStockObject
GetDeviceCaps
kernel32
WriteFile
lstrlenA
OutputDebugStringA
WriteConsoleW
AreFileApisANSI
CloseHandle
CompareStringA
CompareStringW
CreateDirectoryA
CreateDirectoryW
CreateEventA
CreateFileA
CreateFileW
CreateMutexA
CreatePipe
CreateProcessA
CreateSemaphoreA
CreateThread
CreateWaitableTimerA
DeleteCriticalSection
DeleteFileA
DeviceIoControl
DuplicateHandle
EnterCriticalSection
EnumSystemLocalesA
ExitProcess
ExitThread
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FlushFileBuffers
FormatMessageA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetDriveTypeA
GetEnvironmentStringsA
GetEnvironmentStringsW
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesA
GetFileInformationByHandle
GetFileSize
GetFileType
GetFullPathNameA
GetLastError
GetLocaleInfoA
GetLocaleInfoW
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetOverlappedResult
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDefaultLangID
GetSystemDirectoryA
GetSystemInfo
GetSystemTimeAsFileTime
GetTempPathW
GetThreadPriority
GetTickCount
GetTimeFormatA
GetTimeZoneInformation
GetUserDefaultLCID
GetUserDefaultLangID
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalLock
GlobalUnlock
HeapAlloc
HeapCreate
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDebuggerPresent
IsValidCodePage
IsValidLocale
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
MoveFileA
MulDiv
MultiByteToWideChar
OpenEventA
OpenFile
WriteConsoleA
PeekNamedPipe
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadFile
ReleaseSemaphore
RemoveDirectoryW
ResetEvent
ResumeThread
RtlUnwind
SetCurrentDirectoryA
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFilePointer
SetFileTime
SetHandleCount
SetLastError
SetStdHandle
SetThreadAffinityMask
SetThreadIdealProcessor
SetThreadPriority
SetUnhandledExceptionFilter
SetWaitableTimer
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryEnterCriticalSection
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
user32
AdjustWindowRect
CharLowerBuffA
CharToOemA
ClientToScreen
CloseClipboard
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
EmptyClipboard
GetClipboardData
GetDC
GetDesktopWindow
GetForegroundWindow
GetQueueStatus
GetSystemMetrics
LoadCursorA
LoadIconA
MessageBoxW
MsgWaitForMultipleObjects
OpenClipboard
PeekMessageA
PostThreadMessageA
RegisterClassA
RegisterWindowMessageA
ReleaseDC
ScreenToClient
SendMessageA
SetClipboardData
SetCursorPos
SetRect
SetWindowLongA
SetWindowPos
ShowCursor
ShowWindow
TranslateMessage
UpdateWindow
wsprintfA
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
ws2_32
socket
send
select
recv
listen
ioctlsocket
inet_addr
htons
htonl
connect
closesocket
bind
accept
WSAStartup
WSAGetLastError
WSACleanup
WSAAsyncGetHostByName
WSACancelAsyncRequest
winmm
waveOutWrite
waveOutUnprepareHeader
waveOutReset
waveOutPrepareHeader
waveOutOpen
waveOutGetPosition
waveOutGetNumDevs
waveOutGetDevCapsW
waveOutGetDevCapsA
waveOutClose
waveInUnprepareHeader
waveInStart
waveInReset
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveInGetDevCapsW
waveInGetDevCapsA
mciSendCommandA
timeBeginPeriod
timeEndPeriod
timeGetTime
timeKillEvent
timeSetEvent
waveInAddBuffer
waveInClose
ole32
CLSIDFromString
CoCreateInstance
CoFreeUnusedLibraries
CoInitialize
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
PropVariantClear
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ