Static task
static1
Behavioral task
behavioral1
Sample
3dc24657d1aa3eb87da45f532a895b52_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3dc24657d1aa3eb87da45f532a895b52_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3dc24657d1aa3eb87da45f532a895b52_JaffaCakes118
-
Size
82KB
-
MD5
3dc24657d1aa3eb87da45f532a895b52
-
SHA1
ca68f8aae7ee5b6c03b0b5484ea2420906d95685
-
SHA256
9ac3c48304447ab701c9d331e4beffd28a936f31aff2829f38097d275a859396
-
SHA512
dac1a32f0fc1943f05cf098ca0ab5b3e21d672ee847d345e660a92a578f262fe8638c595b801e4aacd456e0c9e8f03719621c14e1132d856bf6079b7bd215bb1
-
SSDEEP
1536:JVivNxZERg2NgHg+FMDlgwS577zVOGD9KNJBFmAQ5C5ATW8/KrRK:jivzSRg2uMhgRhD8JBYAQ5CaTJ/KrRK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3dc24657d1aa3eb87da45f532a895b52_JaffaCakes118
Files
-
3dc24657d1aa3eb87da45f532a895b52_JaffaCakes118.exe windows:4 windows x86 arch:x86
43b4fdc7fb3c26d47ec25311584dc5a1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
strncpy
_strnicmp
strncmp
_strdup
free
strlen
strcpy
strcat
memcpy
memmove
strstr
strcmp
sprintf
fabs
ceil
malloc
floor
fclose
pow
fmod
sin
cos
abs
kernel32
GetModuleHandleA
HeapCreate
GetCurrentProcessId
GetModuleFileNameA
HeapDestroy
ExitProcess
Sleep
CloseHandle
GetCurrentProcess
EnterCriticalSection
WaitForSingleObject
LeaveCriticalSection
InitializeCriticalSection
CreateThread
TerminateThread
HeapAlloc
HeapFree
GetEnvironmentVariableA
SetEnvironmentVariableA
DuplicateHandle
CreatePipe
GetStdHandle
CreateProcessA
WriteFile
PeekNamedPipe
ReadFile
GetLastError
WideCharToMultiByte
FreeLibrary
LoadLibraryA
GetProcAddress
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetTickCount
TlsGetValue
GetVersionExA
FindClose
FindFirstFileA
FindNextFileA
GetCurrentDirectoryA
CreateFileA
SetFilePointer
DeleteFileA
HeapReAlloc
DeleteCriticalSection
TlsFree
WaitForMultipleObjects
GetCurrentThread
CreateSemaphoreA
ReleaseSemaphore
user32
GetForegroundWindow
GetWindowTextA
PeekMessageA
TranslateMessage
DispatchMessageA
GetDesktopWindow
GetDC
ReleaseDC
MessageBoxA
SendMessageA
CharUpperA
DestroyWindow
GetWindow
SetActiveWindow
RemovePropA
UnregisterClassA
DestroyAcceleratorTable
LoadIconA
LoadCursorA
EnumDisplaySettingsA
GetSystemMetrics
DestroyIcon
FillRect
GetIconInfo
DrawIconEx
gdi32
BitBlt
GetStockObject
DeleteObject
CreateDCA
GetDeviceCaps
DeleteDC
GetObjectType
GetObjectA
CreateCompatibleDC
SelectObject
GdiSetBatchLimit
GdiGetBatchLimit
CreateDIBSection
GetDIBits
CreateBitmap
SetPixel
GetTextExtentPoint32A
SetBkMode
SetTextAlign
SetBkColor
SetTextColor
TextOutA
SetStretchBltMode
SetBrushOrgEx
StretchBlt
GetPixel
CreateFontIndirectA
GetTextMetricsA
CreateCompatibleBitmap
advapi32
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
comctl32
InitCommonControlsEx
shell32
ShellExecuteExA
wsock32
closesocket
WSACleanup
WSAStartup
socket
inet_addr
gethostbyname
htons
connect
ioctlsocket
recvfrom
recv
send
sendto
WSAGetLastError
winmm
timeBeginPeriod
timeEndPeriod
ole32
RevokeDragDrop
wininet
HttpQueryInfoA
InternetOpenA
InternetOpenUrlA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
InternetCloseHandle
Sections
.code Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 616B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE