Static task
static1
Behavioral task
behavioral1
Sample
3e29a42d2ad8c726c638ea6710b39353_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3e29a42d2ad8c726c638ea6710b39353_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3e29a42d2ad8c726c638ea6710b39353_JaffaCakes118
-
Size
496KB
-
MD5
3e29a42d2ad8c726c638ea6710b39353
-
SHA1
db8a69332a0302c0ae5746e207671bf0993a5e06
-
SHA256
e8211e9b83d83d127fb9638df58bfdc0f9918693d2c2f8ade56ef9974ae8b675
-
SHA512
d3bbe40dc6471d0b57a276cb221353b04a15ddab716602898542653a7f709a211af80cc886b50aa7bebe5c18c331220913735e331500a5f6d6407c95ac1b2c94
-
SSDEEP
6144:HgDMRHN6PTaM0WaulECz/m8jybY8Z3nOlBBBQ3KGw0AkRg26sA:HgItYTaM04ECz/zyMvBQdAkS26
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e29a42d2ad8c726c638ea6710b39353_JaffaCakes118
Files
-
3e29a42d2ad8c726c638ea6710b39353_JaffaCakes118.exe windows:4 windows x86 arch:x86
5e466e44cbf5723fc3315ac9fff41e63
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupIterateCabinetA
wininet
InternetReadFile
InternetQueryDataAvailable
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
kernel32
GetFileAttributesA
GetFileTime
GetLocaleInfoA
GetCPInfo
GetOEMCP
HeapAlloc
HeapFree
RtlUnwind
HeapReAlloc
VirtualAlloc
GetSystemTimeAsFileTime
ExitProcess
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalFlags
lstrcmpA
InterlockedIncrement
InterlockedDecrement
GetModuleFileNameW
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetVersionExA
FreeLibrary
SetErrorMode
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
CloseHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetProcAddress
GetModuleHandleA
LoadLibraryA
FreeResource
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
FindResourceA
LoadResource
LockResource
SizeofResource
MulDiv
SetLastError
CreateMutexA
ReleaseMutex
GetModuleFileNameA
GetTickCount
GetTempFileNameA
CompareStringW
CompareStringA
lstrlenW
GetTempPathA
lstrcpyA
lstrcatA
Sleep
lstrlenA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
HeapSize
user32
GetMessageA
TranslateMessage
ValidateRect
LoadCursorA
GetSysColorBrush
GetWindowThreadProcessId
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassNameA
SetPropA
GetPropA
GetFocus
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
UpdateWindow
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
PtInRect
CharUpperA
MessageBoxA
DrawIcon
SendMessageA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
ReleaseDC
GetDC
CopyRect
UnregisterClassA
PostQuitMessage
DestroyMenu
GetClassLongA
IsIconic
GetClientRect
EnableWindow
GetSystemMetrics
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
EndDialog
GetNextDlgTabItem
GetParent
IsWindowEnabled
GetDlgItem
GetWindowLongA
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
RemovePropA
gdi32
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SetTextColor
GetClipBox
GetDeviceCaps
DeleteObject
SetMapMode
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetBkColor
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyA
RegEnumKeyA
RegEnumKeyExA
RegOpenKeyA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
shell32
ShellExecuteA
shlwapi
PathIsUNCA
PathFindFileNameA
PathFindExtensionA
PathStripToRootA
ole32
CoTaskMemFree
StringFromCLSID
CLSIDFromString
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 444KB - Virtual size: 442KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ