Static task
static1
Behavioral task
behavioral1
Sample
3cc7a7b239a2b70c4e833ae41b23bfdd_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3cc7a7b239a2b70c4e833ae41b23bfdd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3cc7a7b239a2b70c4e833ae41b23bfdd_JaffaCakes118
-
Size
296KB
-
MD5
3cc7a7b239a2b70c4e833ae41b23bfdd
-
SHA1
59a891642329c0e2fbe031efbf596f2c161bb984
-
SHA256
63797b288b0aea68e8cd5e3a090318de5b08e67a32379860d62a4a4b05d2f45b
-
SHA512
9682611a7abb8c05f10cac8281c6e73259c8593cec1c6ecccd5a2986ef6d7fa64b5c001ae8c5715c5990bf02c82659da78174f5254ddf833f70e70fc8815cacb
-
SSDEEP
6144:nL6+cmUL3gKpxIHmg27F5O84oERjg2wTf9AwRH:nL6+ly3xIj27FV4bhkd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3cc7a7b239a2b70c4e833ae41b23bfdd_JaffaCakes118
Files
-
3cc7a7b239a2b70c4e833ae41b23bfdd_JaffaCakes118.exe windows:4 windows x86 arch:x86
39fd9c4ede4cf67364b61bd6ee17355a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetExitCodeProcess
GetLastError
CreatePipe
ReadFile
PeekNamedPipe
WaitForSingleObject
GlobalFree
GlobalUnlock
GlobalHandle
GetCommandLineW
GetCommandLineA
LoadLibraryW
GetModuleHandleW
GetVersionExA
GetCurrentProcess
GetCurrentThread
GetProcAddress
FindClose
FindNextFileA
FindFirstFileA
GetModuleFileNameA
CreateThread
GetEnvironmentVariableA
SetEndOfFile
SetFilePointer
UnmapViewOfFile
CreateProcessA
GetStdHandle
GetFileSize
CreateFileA
lstrcatA
GetWindowsDirectoryA
GetShortPathNameA
CreateDirectoryA
DeleteFileA
SleepEx
GetTempFileNameA
GetFileAttributesA
GetTempPathA
GetDiskFreeSpaceA
WideCharToMultiByte
SetEnvironmentVariableA
GetDriveTypeA
GetLogicalDriveStringsA
RemoveDirectoryA
SetFileAttributesA
GetTickCount
ResumeThread
SetPriorityClass
SetThreadPriority
MoveFileExA
LocalFree
FormatMessageA
Sleep
CreateFileMappingA
MapViewOfFile
SetConsoleCtrlHandler
GetModuleHandleA
SetCurrentDirectoryA
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetCPInfo
SetStdHandle
IsBadCodePtr
IsBadReadPtr
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
LoadLibraryA
GetTimeZoneInformation
GetStartupInfoA
CloseHandle
GetVersion
FreeEnvironmentStringsA
UnhandledExceptionFilter
FreeEnvironmentStringsW
LCMapStringA
MultiByteToWideChar
LCMapStringW
HeapReAlloc
TerminateProcess
HeapSize
SetHandleCount
WriteFile
GetFileType
SetUnhandledExceptionFilter
FatalAppExitA
FlushFileBuffers
EnterCriticalSection
DeleteCriticalSection
CompareStringW
CompareStringA
GetLocaleInfoW
RtlUnwind
RaiseException
InterlockedDecrement
InterlockedIncrement
GetCurrentDirectoryA
GetEnvironmentStrings
GetEnvironmentStringsW
TlsSetValue
LeaveCriticalSection
ExitProcess
HeapAlloc
HeapFree
GetCurrentThreadId
TlsAlloc
TlsFree
SetLastError
TlsGetValue
InitializeCriticalSection
user32
DispatchMessageW
ExitWindowsEx
DispatchMessageA
TranslateMessage
GetWindowRect
LoadStringA
wsprintfA
MoveWindow
GetParent
GetSystemMetrics
DestroyWindow
DefWindowProcA
DefWindowProcW
CreateWindowExA
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
KillTimer
PostMessageA
SetWindowTextA
GetWindowTextA
MessageBoxA
IsWindowVisible
EnableWindow
SetTimer
ShowWindow
GetDlgItem
SendMessageA
SetDlgItemTextA
GetMessageA
GetMessageW
IsDialogMessageA
CreateDialogParamA
PostQuitMessage
IsWindow
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shell32
SHGetMalloc
SHBrowseForFolderA
SHGetPathFromIDListA
CommandLineToArgvW
ole32
CoInitialize
CoUninitialize
Sections
.text Size: 132KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ