Static task
static1
Behavioral task
behavioral1
Sample
3d60daaff05d2f9699ba2339cad89b28_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3d60daaff05d2f9699ba2339cad89b28_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3d60daaff05d2f9699ba2339cad89b28_JaffaCakes118
-
Size
98KB
-
MD5
3d60daaff05d2f9699ba2339cad89b28
-
SHA1
2ed8715d379ad39379ef94c3c247164c567a0d67
-
SHA256
e81e553e58fe7dee0f283188435ec7c359ae0c055eb8d361f9a2dd6489b89233
-
SHA512
fc09175381c60a085655f9e8a367723a231b12c515a321c3108c064965efc6cfad0b08802f38ec6085f9e022e25f02626cf0fc6c5a2f4a303c24282fab6647bb
-
SSDEEP
1536:NbOCamqHmKQYuUdxQ0EKFzm+cbn7iC79T7hXWLNK/IejaISxTlYinh:NbXavQXoxQZKBm+u7Z7VdGLNK/IHxTa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d60daaff05d2f9699ba2339cad89b28_JaffaCakes118
Files
-
3d60daaff05d2f9699ba2339cad89b28_JaffaCakes118.exe windows:4 windows x86 arch:x86
11494d4855892879064a3bcfe098f667
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsChild
DefFrameProcA
EnumThreadWindows
GetPropA
GetParent
IsWindowEnabled
EnableMenuItem
EndPaint
CallNextHookEx
DefWindowProcA
GetSysColorBrush
EnableWindow
GetDC
RegisterClassA
GetWindow
EndDeferWindowPos
EqualRect
CreatePopupMenu
GetLastActivePopup
GetScrollPos
GetCapture
GetForegroundWindow
MessageBoxA
GetSubMenu
ShowScrollBar
GetMenuState
GetKeyState
SetWindowTextA
SystemParametersInfoA
GetKeyNameTextA
GetScrollRange
FrameRect
DispatchMessageA
GetClipboardData
GetMenu
EnumChildWindows
DrawTextA
BeginPaint
CharLowerBuffA
GetFocus
GetDCEx
CallWindowProcA
CreateMenu
GetClassInfoA
DrawMenuBar
GetDesktopWindow
GetScrollInfo
GetMenuItemCount
SetTimer
CharLowerA
CharNextA
CreateWindowExA
DrawEdge
GetClientRect
GetCursor
GetMenuItemID
HideCaret
SetCursor
DrawIconEx
GetActiveWindow
EnumWindows
FindWindowA
GetIconInfo
GetSysColor
IsMenu
EnableScrollBar
SetWindowLongA
BeginDeferWindowPos
TrackPopupMenu
GetWindowTextA
IsWindowVisible
CreateIcon
DrawFrameControl
ShowWindow
SetWindowPos
ClientToScreen
GetMessagePos
CharToOemA
gdi32
GetDIBColorTable
BitBlt
CreateDIBitmap
GetObjectA
SelectPalette
RestoreDC
kernel32
SetEndOfFile
lstrcpynA
GetModuleHandleA
GetStringTypeW
SetThreadLocale
FindResourceA
ExitThread
FormatMessageA
GetOEMCP
GetProcAddress
GetDateFormatA
GetCurrentProcess
SetHandleCount
GetLocaleInfoA
lstrcpyA
HeapDestroy
GetLastError
FindFirstFileA
GetVersionExA
VirtualAllocEx
GetEnvironmentStrings
GetCurrentThread
EnumCalendarInfoA
WriteFile
GetLocalTime
GetACP
CompareStringA
FreeLibrary
GetFileSize
lstrlenA
GetCommandLineA
GetCPInfo
FindClose
HeapFree
GetCurrentProcessId
GlobalAlloc
CloseHandle
CreateThread
RaiseException
LoadLibraryExA
Sleep
ResetEvent
GetVersion
LocalFree
lstrcmpA
GetFileAttributesA
GetStdHandle
WideCharToMultiByte
HeapAlloc
GetStringTypeA
VirtualQuery
VirtualFree
GetCurrentThreadId
ReadFile
CreateFileA
GetProcessHeap
LoadLibraryA
LoadResource
GetFullPathNameA
DeleteCriticalSection
GlobalAddAtomA
SetFilePointer
LocalReAlloc
LocalAlloc
FreeResource
GlobalFindAtomA
GetSystemDefaultLangID
SetErrorMode
GetStartupInfoA
GetFileType
MoveFileA
MoveFileExA
MulDiv
GetTickCount
GetModuleFileNameA
SetLastError
ExitProcess
DeleteFileA
GlobalDeleteAtom
LockResource
GetThreadLocale
WaitForSingleObject
VirtualAlloc
CreateEventA
GetUserDefaultLCID
SetEvent
comdlg32
FindTextA
GetOpenFileNameA
shlwapi
PathFileExistsA
SHDeleteValueA
SHGetValueA
SHQueryInfoKeyA
SHQueryValueExA
PathIsDirectoryA
version
VerInstallFileA
VerFindFileA
GetFileVersionInfoA
oleaut32
VariantCopyInd
SysStringLen
VariantChangeType
SafeArrayGetUBound
SafeArrayGetElement
SysAllocStringLen
SysReAllocStringLen
SafeArrayUnaccessData
SafeArrayPtrOfIndex
ole32
ReleaseStgMedium
GetHGlobalFromStream
CoUninitialize
CoGetObjectContext
PropVariantClear
CoGetMalloc
StgOpenStorage
msvcrt
swprintf
wcscspn
rand
exp
strcmp
atol
log
memcpy
calloc
memmove
Sections
CODE Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 119B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ