Static task
static1
Behavioral task
behavioral1
Sample
3d5d67ef586ed3071d1905a218996784_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3d5d67ef586ed3071d1905a218996784_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3d5d67ef586ed3071d1905a218996784_JaffaCakes118
-
Size
180KB
-
MD5
3d5d67ef586ed3071d1905a218996784
-
SHA1
80db5302f802ed98260173cb7da8526f7c717269
-
SHA256
6e2576b384a4555d10c2ea6089c0f3d82110800150a51881e0f802f2b81f9246
-
SHA512
57321df39ed85be7dc50394605e5e0b28b37c06da211126f821f761c907d2abe049426404c0cf6819afd7bd7e2703d09feb88d537e2131253084dde7e74c438e
-
SSDEEP
3072:41xJUnjrN1HCWv19c/2/HeL4EEFOGF7jvGyXfnLUyxFsyhICST:cJCfNxRe/S04P9dj+OpG1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d5d67ef586ed3071d1905a218996784_JaffaCakes118
Files
-
3d5d67ef586ed3071d1905a218996784_JaffaCakes118.exe windows:1 windows x86 arch:x86
1141d72ab57173f2ec574311bb2b8bd6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadConsoleOutputCharacterA
GetLogicalDriveStringsA
ReadConsoleA
GetCommandLineA
GetLastError
GetConsoleTitleA
WriteConsoleOutputCharacterA
ConnectNamedPipe
GetConsoleCursorMode
GetProcessShutdownParameters
SystemTimeToFileTime
CreateSocketHandle
FindResourceA
QueryDosDeviceA
SetConsoleMaximumWindowSize
GetProcessTimes
FlushConsoleInputBuffer
SetCurrentDirectoryA
GetProcessPriorityBoost
UpdateResourceA
GetSystemDirectoryA
GetExitCodeProcess
SetDllDirectoryA
OpenEventA
OpenJobObjectA
Process32Next
GetComputerNameA
GetCurrentDirectoryA
IsBadWritePtr
CreateEventA
FindResourceExW
GlobalAlloc
GlobalAddAtomA
CreateFileMappingA
SetEvent
LocalHandle
OpenWaitableTimerA
GetDateFormatA
GetDriveTypeA
GetSystemInfo
LocalLock
ReadConsoleOutputA
VerifyVersionInfoA
GetWindowsDirectoryA
IsBadCodePtr
SetComputerNameExW
GetProcessId
SetConsoleInputExeNameA
CreateDirectoryA
SetFilePointer
SetConsoleHardwareState
FreeEnvironmentStringsA
WriteConsoleA
GetConsoleTitleA
GetSystemDirectoryA
GetConsoleMode
VirtualAllocEx
CreateFileMappingW
SetConsoleIcon
IsBadReadPtr
GetEnvironmentStringsA
OpenMutexA
SetUserGeoID
LCMapStringA
GetSystemWindowsDirectoryA
GetTickCount
LoadLibraryExA
SetVolumeLabelA
SetCommMask
GetDefaultCommConfigA
EnumUILanguagesA
IsBadStringPtrA
TerminateThread
user32
BringWindowToTop
GetWindowWord
GetDlgCtrlID
PrivateExtractIconExA
FrameRect
MenuWindowProcA
GetUserObjectInformationA
ChangeMenuA
OemToCharBuffA
CreateWindowStationW
MessageBoxTimeoutA
GetAncestor
CharLowerBuffA
InsertMenuItemW
CreateWindowStationA
LoadMenuA
OemToCharBuffA
RegisterMessagePumpHook
EnumClipboardFormats
RealGetWindowClass
OemToCharBuffA
GetWindowRect
LoadMenuIndirectW
InvalidateRgn
GetWindowRgnBox
IsCharUpperA
GetAltTabInfoA
IsDialogMessageA
GetInputDesktop
DefDlgProcA
GetWindowPlacement
GetWindowRgnBox
UpdatePerUserSystemParameters
PrivateExtractIconExA
GetWindow
MapDialogRect
AnyPopup
IsZoomed
GetKeyboardLayout
PeekMessageA
GetOpenClipboardWindow
TabbedTextOutA
UnionRect
GetComboBoxInfo
GetPriorityClipboardFormat
CharUpperBuffA
GetKeyboardType
GetQueueStatus
GetKeyboardLayoutNameA
GetMenuItemID
IsWindow
DrawStateA
GetWindowLongA
CallMsgFilter
GetMenuItemInfoA
UnregisterClassA
EnumDisplayDevicesA
SetWindowTextA
GetShellWindow
GetWindowTextLengthA
DrawMenuBar
SetDlgItemTextA
GetPropA
RegisterServicesProcess
IsWindowInDestroy
DrawTextExW
advapi32
AddAccessDeniedObjectAce
Sections
.text Size: 45KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ