Static task
static1
Behavioral task
behavioral1
Sample
3bcdea516b8842c64172f3e3541bfdff_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3bcdea516b8842c64172f3e3541bfdff_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3bcdea516b8842c64172f3e3541bfdff_JaffaCakes118
-
Size
193KB
-
MD5
3bcdea516b8842c64172f3e3541bfdff
-
SHA1
9a0daf681ac58d029d890ae6a9a2b3093905455d
-
SHA256
0dbcef63a3a52df64ae8fd5ca7451e2618904daaa25065e7970e43ea454e52e7
-
SHA512
cdbd00184bfea2796a29a2ed252a2e01c81923a2dded93943b266060d427eb7bac1676be0c11974e6694df8b6817adf16c61d6a514289d39784d5cc3fc1fea9e
-
SSDEEP
3072:2dHQjc14R3WiTgROf5bQf8E1yxbU8fu20EWKqteMQycdGrVNaXc:2FQjs4Rm0fBQf8E1iUP/P3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3bcdea516b8842c64172f3e3541bfdff_JaffaCakes118
Files
-
3bcdea516b8842c64172f3e3541bfdff_JaffaCakes118.exe windows:1 windows x86 arch:x86
89c2187ce2fc9effb10ec493daed3c26
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SelectPalette
CreateDIBitmap
RectVisible
PolyDraw
GetViewportOrgEx
EnumObjects
SetDIBits
user32
GetMenu
GetMenuStringA
SendMessageA
ModifyMenuA
GetActiveWindow
GetWindowPlacement
DispatchMessageA
CharToOemA
CheckMenuItem
ShowWindow
ExitWindowsEx
ReleaseDC
GetDesktopWindow
CascadeWindows
SetCursorPos
FillRect
kernel32
CreateDirectoryA
ExitProcess
LocalAlloc
GetCurrentProcess
FindResourceA
GetCommState
LoadResource
SetFileTime
SizeofResource
lstrcmpA
LocalFree
VirtualProtectEx
LoadLibraryA
DeviceIoControl
GetProcAddress
InterlockedIncrement
GetModuleHandleA
SetConsoleOutputCP
lstrcmpi
GetPriorityClass
GetThreadPriority
SetConsoleCursorPosition
GetFileAttributesA
SetCurrentDirectoryA
GetCPInfo
DuplicateHandle
GetFileTime
GetFileSize
BuildCommDCBAndTimeoutsA
SetCommState
TlsFree
UnmapViewOfFile
OpenProcess
CallNamedPipeA
GetCurrencyFormatA
GlobalReAlloc
wsock32
getsockname
listen
send
htonl
WSAStartup
shutdown
gethostbyaddr
inet_ntoa
connect
getsockopt
ntohl
setsockopt
WSACleanup
bind
WSAGetLastError
gethostbyname
recv
ntohs
sendto
select
gethostname
socket
htons
closesocket
accept
Sections
.text Size: 12KB - Virtual size:
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: 5KB - Virtual size:
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 126KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ