Static task
static1
Behavioral task
behavioral1
Sample
3cbda6a6813a0d04d850ff4052a1768e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3cbda6a6813a0d04d850ff4052a1768e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3cbda6a6813a0d04d850ff4052a1768e_JaffaCakes118
-
Size
102KB
-
MD5
3cbda6a6813a0d04d850ff4052a1768e
-
SHA1
0026f3b87fad056f0b63f0086e55445813f9ed71
-
SHA256
c1a65c904b3b3885a1eb635a144d0d4fbbe19e87e7537139f1c286d336831dde
-
SHA512
714059945b3ac44c99f1b4f6cb3db8835e3d4762a676152f915bdd71bff62936627f9653b2c057f09e420994b0d54cd3a9bad7fd2ae7c3fe5f27c03cb1619d92
-
SSDEEP
1536:Qla2T8uOR09HN2GeJ0XTwV/kzlp5h3dcURzOhRll8OdU4:Ql2p0VN1ewY/kzlfhNIhPl84U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3cbda6a6813a0d04d850ff4052a1768e_JaffaCakes118
Files
-
3cbda6a6813a0d04d850ff4052a1768e_JaffaCakes118.exe windows:4 windows x86 arch:x86
d8885a9967a1c8afe45ad1183fa3238d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
wcscspn
sprintf
memmove
sin
advapi32
RegQueryValueExA
RegQueryValueA
RegOpenKeyA
shell32
SHGetFolderPathA
SHGetSpecialFolderLocation
user32
SetRect
GetKeyNameTextA
PeekMessageW
SetWindowLongA
GetIconInfo
SendMessageA
GetClassInfoA
GetWindowRect
CreateIcon
SetScrollRange
LoadStringA
DestroyIcon
DefFrameProcA
DefMDIChildProcA
SetFocus
MoveWindow
CharNextW
SystemParametersInfoA
PeekMessageA
IsDialogMessageW
GetMenu
GetParent
LoadIconA
RemoveMenu
DefWindowProcA
IsChild
SetTimer
GetWindowLongW
GetWindowDC
ReleaseDC
CharLowerA
ReleaseCapture
EnableMenuItem
ActivateKeyboardLayout
DrawIcon
SetForegroundWindow
GetClassLongA
CharToOemA
ScreenToClient
GetWindow
OpenClipboard
WaitMessage
MessageBoxA
OemToCharA
RemovePropA
DestroyMenu
GetClipboardData
InvalidateRect
SetCapture
CallNextHookEx
IsWindowVisible
GetActiveWindow
WindowFromPoint
MapWindowPoints
DrawFrameControl
GetCursorPos
GetScrollPos
GetPropA
GetTopWindow
GetMenuStringA
MsgWaitForMultipleObjects
TranslateMDISysAccel
LoadKeyboardLayoutA
GetScrollRange
GetSystemMetrics
GetWindowThreadProcessId
DrawAnimatedRects
SetClipboardData
SetMenuItemInfoA
MessageBeep
ClientToScreen
SetScrollInfo
DrawMenuBar
GetKeyboardLayout
UnhookWindowsHookEx
RegisterClassA
GetKeyboardType
IsWindow
SetClassLongA
GetMessagePos
DispatchMessageW
ShowScrollBar
CreateMenu
SetScrollPos
PostMessageA
InsertMenuA
FillRect
FindWindowA
DispatchMessageA
EnableWindow
CreatePopupMenu
SetPropA
CreateWindowExA
DrawEdge
GetForegroundWindow
GetClassNameA
GetDCEx
GetMenuItemID
GetWindowLongA
PostQuitMessage
GetMenuItemCount
ShowWindow
EnumWindows
CharLowerBuffA
IsDialogMessageA
GetMenuItemInfoA
IsWindowUnicode
CloseClipboard
DestroyWindow
GetMenuState
GetLastActivePopup
LoadCursorA
IsZoomed
RegisterClipboardFormatA
EnumThreadWindows
IsWindowEnabled
ScrollWindow
UpdateWindow
SetWindowsHookExA
GetKeyboardState
DrawIconEx
OffsetRect
ShowOwnedPopups
GetCapture
AdjustWindowRectEx
RegisterWindowMessageA
DrawTextA
SendMessageW
UnregisterClassA
IsRectEmpty
GetWindowPlacement
CharUpperBuffA
EqualRect
EnableScrollBar
SetActiveWindow
wsprintfA
MapVirtualKeyA
GetSystemMenu
SetCursor
DestroyCursor
GetCursor
GetKeyState
GetDC
BeginPaint
SetWindowTextA
LoadBitmapA
DeleteMenu
CheckMenuItem
InflateRect
KillTimer
GetKeyboardLayoutNameA
GetDesktopWindow
GetScrollInfo
EnumChildWindows
SetWindowLongW
GetWindowTextA
PtInRect
SetWindowPos
GetSysColor
InsertMenuItemA
SetParent
GetFocus
EndPaint
FrameRect
TranslateMessage
GetKeyboardLayoutList
SetWindowPlacement
TrackPopupMenu
GetClientRect
GetDlgItem
CallWindowProcA
oleaut32
VariantCopyInd
OleLoadPicture
kernel32
lstrcmpiA
ExitProcess
FindFirstFileA
VirtualAlloc
GetThreadLocale
GetStringTypeW
LoadLibraryA
GetCurrentThread
LoadResource
GetUserDefaultLCID
DeleteFileA
CreateEventA
GetLocalTime
HeapDestroy
HeapFree
SetLastError
lstrcatA
WideCharToMultiByte
lstrcmpA
CreateThread
GetCurrentThreadId
GetCPInfo
MulDiv
GetProcessHeap
GetProcAddress
LocalReAlloc
LocalFree
CreateFileA
HeapAlloc
GlobalAlloc
FindResourceA
SetEvent
GetDiskFreeSpaceA
GetTickCount
GlobalFindAtomA
ExitThread
GetLastError
VirtualQuery
GetFileSize
SetEndOfFile
EnterCriticalSection
VirtualFree
SetThreadLocale
lstrlenA
GetModuleFileNameA
EnumCalendarInfoA
RaiseException
GetFullPathNameA
Sleep
SizeofResource
GetEnvironmentStrings
LoadLibraryExA
MoveFileExA
SetErrorMode
WriteFile
GetCurrentProcessId
GetStdHandle
GetModuleHandleA
SetHandleCount
GetACP
GetDateFormatA
ReadFile
CompareStringA
GetCommandLineA
GetStartupInfoA
GetFileType
GetSystemDefaultLangID
LockResource
GetVersion
GetOEMCP
GetLocaleInfoA
GetFileAttributesA
GetVersionExA
InitializeCriticalSection
GlobalDeleteAtom
lstrcpynA
GetStringTypeA
ResetEvent
VirtualAllocEx
GetCurrentProcess
FreeResource
FreeLibrary
GlobalAddAtomA
SetFilePointer
FindClose
FormatMessageA
Sections
CODE Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 610B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ