Static task
static1
Behavioral task
behavioral1
Sample
3ccb71d4ae78b37c13f2ce9059f2eac8_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3ccb71d4ae78b37c13f2ce9059f2eac8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3ccb71d4ae78b37c13f2ce9059f2eac8_JaffaCakes118
-
Size
115KB
-
MD5
3ccb71d4ae78b37c13f2ce9059f2eac8
-
SHA1
035d12ffd583db5783630a48ca7bc696d482d0fe
-
SHA256
e53aa138d7c1a0c93d2a8edf870964058e50bc06ec2df2e33a21d04b8c0db00d
-
SHA512
e51916c84fc80b52980dadc691c24f9ea40c07511652879b026f18c7d52b0c0fd1c8964974e073506d1ffb7770fc96b0f1c32b139423fc205cf4f3a693a1a321
-
SSDEEP
3072:BYJwta3L3nvYVKo4GDZINNBYZUTMW//tdg54S:RMDMZCB4iMW/16
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ccb71d4ae78b37c13f2ce9059f2eac8_JaffaCakes118
Files
-
3ccb71d4ae78b37c13f2ce9059f2eac8_JaffaCakes118.exe windows:4 windows x86 arch:x86
cac4a2bd8e046624a0070fc4228fcb33
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CallWindowProcA
SetCursor
GetSystemMetrics
DestroyMenu
GetKeyboardLayout
EndPaint
SystemParametersInfoA
GetWindowPlacement
SetWindowPos
CharNextW
GetCapture
SetWindowLongA
MsgWaitForMultipleObjects
GetWindowDC
OpenClipboard
WindowFromPoint
TranslateMessage
UpdateWindow
EnableMenuItem
CallNextHookEx
CreateWindowExA
CreateIcon
LoadStringA
GetKeyboardLayoutList
GetScrollPos
IsWindowVisible
SendMessageW
SendMessageA
OffsetRect
SetParent
AdjustWindowRectEx
SetMenu
SetMenuItemInfoA
SetScrollPos
ScreenToClient
EnumChildWindows
PostQuitMessage
DestroyIcon
EmptyClipboard
CheckMenuItem
ReleaseDC
CharUpperBuffA
RegisterClipboardFormatA
GetMenuState
GetScrollInfo
DrawMenuBar
GetSubMenu
BeginPaint
GetActiveWindow
GetMenu
RegisterClassA
MapVirtualKeyA
RemoveMenu
PeekMessageW
IsWindow
SetTimer
IsDialogMessageW
ShowScrollBar
IsWindowEnabled
FindWindowA
DrawIcon
GetPropA
GetLastActivePopup
wsprintfA
RegisterWindowMessageA
LoadCursorA
GetMenuItemCount
GetClassLongA
CreatePopupMenu
MessageBoxA
RemovePropA
SetWindowTextA
IsWindowUnicode
EnumWindows
ChildWindowFromPoint
TranslateMDISysAccel
GetFocus
SetClassLongA
ShowWindow
CharToOemA
CharNextA
SetCapture
GetKeyboardLayoutNameA
ReleaseCapture
MessageBeep
DefMDIChildProcA
GetForegroundWindow
GetClipboardData
GetWindow
SetWindowLongW
SetPropA
GetCursorPos
IsZoomed
IsDialogMessageA
GetDesktopWindow
DefWindowProcA
SetWindowsHookExA
UnregisterClassA
GetClientRect
GetClassNameA
CreateMenu
DefFrameProcA
UnhookWindowsHookEx
EnableScrollBar
SetFocus
OemToCharA
MoveWindow
DrawEdge
SetScrollRange
SetActiveWindow
IntersectRect
FillRect
ShowOwnedPopups
DispatchMessageA
SetRect
CharLowerBuffA
GetMenuStringA
GetClassInfoA
InsertMenuItemA
KillTimer
CloseClipboard
InsertMenuA
DestroyWindow
IsChild
GetWindowThreadProcessId
IsIconic
MapWindowPoints
GetDlgItem
LoadIconA
GetScrollRange
SetForegroundWindow
DrawFrameControl
GetMenuItemID
DrawAnimatedRects
GetIconInfo
WaitMessage
DispatchMessageW
EnableWindow
GetMessagePos
GetCursor
EnumThreadWindows
PeekMessageA
SetClipboardData
InflateRect
ScrollWindow
GetMenuItemInfoA
GetSysColorBrush
GetWindowLongW
ActivateKeyboardLayout
CharLowerA
GetSystemMenu
GetTopWindow
DeleteMenu
PostMessageA
GetSysColor
EqualRect
DrawTextA
SetWindowPlacement
GetWindowTextA
GetKeyboardState
TrackPopupMenu
DestroyCursor
GetWindowLongA
RedrawWindow
PtInRect
GetDCEx
GetKeyState
GetKeyNameTextA
InvalidateRect
LoadKeyboardLayoutA
IsRectEmpty
DrawIconEx
LoadBitmapA
GetDC
ClientToScreen
FrameRect
GetKeyboardType
msvcrt
wcsncmp
acos
fabs
cos
memmove
kernel32
FindFirstFileA
LocalReAlloc
GetOEMCP
MulDiv
ExitThread
GlobalFindAtomA
HeapDestroy
lstrcmpiA
GetProcessHeap
GetLocaleInfoA
InitializeCriticalSection
LocalFree
GetLocalTime
LoadLibraryA
lstrcatA
FreeResource
GetFileSize
GetFullPathNameA
lstrcpynA
MoveFileA
GetStringTypeW
GetStartupInfoA
ResetEvent
GlobalDeleteAtom
GetSystemDefaultLangID
SetHandleCount
GetCurrentProcess
GetCurrentThread
SetLastError
GetUserDefaultLCID
CreateFileA
GetVersionExA
DeleteCriticalSection
SetEvent
SizeofResource
GetFileAttributesA
GetCurrentProcessId
GetProcAddress
LoadLibraryExA
LoadResource
GetStringTypeA
ExitProcess
GlobalAddAtomA
GetVersion
Sleep
HeapAlloc
GetEnvironmentStrings
lstrcpyA
SetEndOfFile
lstrcmpA
GetCurrentThreadId
CompareStringA
GetCommandLineA
VirtualFree
VirtualQuery
GetFileType
WaitForSingleObject
CreateThread
GlobalAlloc
GetStdHandle
DeleteFileA
GetTickCount
EnterCriticalSection
HeapFree
EnumCalendarInfoA
WideCharToMultiByte
LockResource
LocalAlloc
VirtualAlloc
WriteFile
ReadFile
GetCPInfo
GetModuleFileNameA
GetThreadLocale
FindClose
GetLastError
MoveFileExA
FormatMessageA
SetFilePointer
FreeLibrary
RaiseException
SetThreadLocale
GetModuleHandleA
VirtualAllocEx
SetErrorMode
lstrlenA
CreateEventA
CloseHandle
GetACP
Sections
.text Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE