Static task
static1
Behavioral task
behavioral1
Sample
3bdfa6027ff68c4d618ba4831f63fe4d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3bdfa6027ff68c4d618ba4831f63fe4d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3bdfa6027ff68c4d618ba4831f63fe4d_JaffaCakes118
-
Size
20.2MB
-
MD5
3bdfa6027ff68c4d618ba4831f63fe4d
-
SHA1
f9c6a261bfd257a8dea819b5a46d102eeb3b42e0
-
SHA256
9fe6ba289dbb8abbded38f590881c7a10f49c6d22a9137913ab4e5621ebb2014
-
SHA512
d3472c970c15bb6253c8933329b9016783a0780fe69d48cf40a340682f11371a82f3f307e84eea572a593ff5e4730a6af73444f96a7a8512e6640d4f6eca8611
-
SSDEEP
6144:kspeDEJ/7mX7wYGJg8vFDpSHRuqO4Ji33dqoKfg4:xpeGiLRm1uu9y63d7Ko4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3bdfa6027ff68c4d618ba4831f63fe4d_JaffaCakes118
Files
-
3bdfa6027ff68c4d618ba4831f63fe4d_JaffaCakes118.exe windows:4 windows x86 arch:x86
2bdffda035ff45890b08a2f1e79ab2ac
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
FindNextFileA
DeleteFileA
FindFirstFileA
WaitForSingleObject
GetExitCodeThread
VirtualFree
VirtualAlloc
GetModuleHandleA
InitializeCriticalSection
DeviceIoControl
GetCurrentProcess
GetVolumeInformationA
CopyFileA
GetSystemDirectoryA
GetModuleFileNameA
CreateMutexA
SetStdHandle
ReadFile
LCMapStringA
SetFilePointer
GetStringTypeA
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
WideCharToMultiByte
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
MultiByteToWideChar
FreeEnvironmentStringsA
UnhandledExceptionFilter
TerminateProcess
GetOEMCP
GetACP
GetCPInfo
HeapAlloc
HeapFree
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
RtlUnwind
GetLastError
FlushFileBuffers
LocalAlloc
LocalLock
CreateFileA
TryEnterCriticalSection
LeaveCriticalSection
CreateDirectoryA
GetLocalTime
CreateThread
GetWindowsDirectoryA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetStringTypeW
GetFileSize
WriteFile
CloseHandle
LocalUnlock
LocalFree
Sleep
LoadLibraryA
GetProcAddress
LCMapStringW
FreeLibrary
user32
GetSystemMetrics
wsprintfA
GetWindowRect
SetWindowPos
SetWindowLongA
GetWindowLongA
GetClientRect
GetWindowTextA
GetKeyState
CloseClipboard
DefWindowProcA
BeginPaint
PostQuitMessage
GetForegroundWindow
GetDC
ReleaseDC
EnumWindows
LoadCursorA
LoadIconA
EndPaint
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
GetCursorPos
ScreenToClient
OpenClipboard
GetClipboardData
gdi32
GetStockObject
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetDeviceCaps
GetSystemPaletteEntries
GetDIBits
DeleteObject
DeleteDC
TextOutA
ws2_32
inet_ntoa
gethostbyname
inet_addr
WSACleanup
WSAStartup
closesocket
select
connect
htons
gethostname
recv
send
socket
setsockopt
ioctlsocket
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
shell32
ShellExecuteA
Sections
.text Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 323KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.shared Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 104KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ