Static task
static1
Behavioral task
behavioral1
Sample
3d0987aa5732bbbf5e87c0f1833f4e19_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3d0987aa5732bbbf5e87c0f1833f4e19_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3d0987aa5732bbbf5e87c0f1833f4e19_JaffaCakes118
-
Size
44KB
-
MD5
3d0987aa5732bbbf5e87c0f1833f4e19
-
SHA1
b2d49ff25d4bd6fcc6ad78e2610af6ba1575a409
-
SHA256
1a2f78f876aa187e38d538d9af8b1f99237f7638efa6ae1fa466b1b0321c53d9
-
SHA512
549cc68be27de21e9fe32a7e0336a472ce770d9729a86d54a563665811d10a1109ff9f4bbfbc9f956d2eff83c43b0a4538abc172a571df429ed12cf499fa4636
-
SSDEEP
768:w9Q3wuwahLe1tgj6mwTahab8yWpLP4z7:3Higj6mwW8bLqM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d0987aa5732bbbf5e87c0f1833f4e19_JaffaCakes118
Files
-
3d0987aa5732bbbf5e87c0f1833f4e19_JaffaCakes118.exe windows:4 windows x86 arch:x86
37f8c9071da9a636b38cc49c35034eb5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
password
?HookUninstaller@CHook@@QAEHXZ
?HookInstaller@CHook@@QAEPAUHHOOK__@@XZ
??0CHook@@QAE@XZ
??1CHook@@UAE@XZ
mfc42
ord5710
ord535
ord1997
ord5194
ord798
ord533
ord922
ord6282
ord6283
ord2841
ord2107
ord3584
ord543
ord803
ord791
ord1247
ord523
ord2029
ord2077
ord2764
ord5440
ord6383
ord5450
ord6394
ord4673
ord4274
ord2818
ord940
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord926
ord4486
ord6375
ord939
ord4424
ord3738
ord815
ord561
ord641
ord6403
ord1168
ord1200
ord2514
ord6927
ord6929
ord924
ord2725
ord801
ord668
ord800
ord6143
ord2770
ord356
ord3522
ord541
ord5265
ord4376
ord4853
ord4998
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord3597
ord324
ord2301
ord2370
ord4234
ord6334
ord4710
ord3663
ord537
ord941
ord823
ord3811
ord2820
ord4278
ord2763
ord4129
ord540
ord858
ord825
ord4080
ord860
ord4622
ord3825
ord3079
ord6883
ord1576
msvcrt
_controlfp
__p__fmode
_except_handler3
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
sscanf
__set_app_type
_purecall
_mbscmp
_splitpath
_setmbcp
__CxxFrameHandler
kernel32
DeleteCriticalSection
CreateThread
GetModuleHandleA
LeaveCriticalSection
CopyFileA
GetWindowsDirectoryA
GetCommandLineA
GetProcAddress
LoadLibraryA
FreeLibrary
DeleteFileA
Sleep
TerminateThread
GetStartupInfoA
InitializeCriticalSection
EnterCriticalSection
user32
EnableWindow
DispatchMessageA
GetMessageA
TranslateMessage
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
wsock32
gethostname
Sections
.text Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ