Static task
static1
Behavioral task
behavioral1
Sample
3d00bbe0e2e2cea072c04255223457aa_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3d00bbe0e2e2cea072c04255223457aa_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3d00bbe0e2e2cea072c04255223457aa_JaffaCakes118
-
Size
195KB
-
MD5
3d00bbe0e2e2cea072c04255223457aa
-
SHA1
dc79e5bcffe32d8852e4bd6c5b90bc1425d12a4d
-
SHA256
6582af5cf43f9f5bb70c86af7a8ddb9fee33775298aa74d026e0329f2b242cd3
-
SHA512
c8d7b695b251701d0b705ff5278df4a5c1dce20e4129a9fe9a40341742b0e94a885b8b6114f55cea9832b6aacf5b4bdee1045131dac535b98a08b0d42e0460bd
-
SSDEEP
3072:lW/WVR6c24AutahLl5LyHTTK+i/o68rTlR48rHppDTh/zoAZ:lW+Vx1taRyG/o6elR48rJJh/Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d00bbe0e2e2cea072c04255223457aa_JaffaCakes118
Files
-
3d00bbe0e2e2cea072c04255223457aa_JaffaCakes118.exe windows:4 windows x86 arch:x86
cda438550dbe85bbfad7311f7b936496
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
comdlg32
GetFileTitleA
ole32
OleGetAutoConvert
StgCreateDocfileOnILockBytes
CoGetMalloc
CoTaskMemFree
ProgIDFromCLSID
ReleaseStgMedium
CLSIDFromProgID
CoGetClassObject
CoFreeUnusedLibraries
CoTaskMemAlloc
RevokeDragDrop
CoCreateGuid
OleDuplicateData
CreateStreamOnHGlobal
OleRun
RegisterDragDrop
StringFromCLSID
GetHGlobalFromILockBytes
GetHGlobalFromStream
CLSIDFromString
OleRegGetUserType
CoCreateInstance
StgOpenStorageOnILockBytes
CreateILockBytesOnHGlobal
gdi32
GetPath
SetTextColor
FlattenPath
GetBitmapBits
StrokePath
PolyBezier
RoundRect
CreateFontIndirectA
SetStretchBltMode
ExtCreatePen
AnimatePalette
CreatePen
PlgBlt
GetBkColor
SetDIBits
comctl32
ImageList_Add
ImageList_DrawEx
ImageList_Create
ImageList_GetIconSize
ImageList_Destroy
rpcrt4
RpcBindingSetAuthInfoA
RpcStringBindingComposeA
RpcBindingFromStringBindingA
NdrClientCall
RpcStringFreeA
shlwapi
PathStripToRootW
PathCanonicalizeW
PathIsURLW
PathIsRootW
PathIsRelativeW
PathCombineW
kernel32
GetProfileStringW
GetSystemTime
CreateFiberEx
GetFileType
GetVolumeInformationW
LocalAlloc
GetVersionExW
SetCommConfig
UnlockFile
FileTimeToSystemTime
FlushFileBuffers
SearchPathW
EnumResourceNamesW
GetFileAttributesA
FileTimeToLocalFileTime
FlushFileBuffers
GetUserDefaultLangID
VerLanguageNameW
IsDBCSLeadByte
SetEndOfFile
GetFileTime
CompareStringW
FindResourceExA
LockFile
GetSystemDirectoryW
user32
IsClipboardFormatAvailable
GetSysColorBrush
SetWindowPos
SetScrollRange
DestroyCursor
CallNextHookEx
ChildWindowFromPoint
SetClipboardData
SetWindowsHookExW
EmptyClipboard
DefWindowProcW
ClipCursor
UnhookWindowsHookEx
DestroyIcon
RegisterClassW
MonitorFromWindow
ToAscii
DrawEdge
WinHelpW
GetSysColor
Sections
.text Size: 170KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lib Size: 512B - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ