Static task
static1
Behavioral task
behavioral1
Sample
3ebe56bb592b5b0ebbe6bb8aff27fc73_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ebe56bb592b5b0ebbe6bb8aff27fc73_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3ebe56bb592b5b0ebbe6bb8aff27fc73_JaffaCakes118
-
Size
144KB
-
MD5
3ebe56bb592b5b0ebbe6bb8aff27fc73
-
SHA1
d4f75fd03012995245423746d33a3a68648fb93a
-
SHA256
12d4591b202d11abf014b388ff2c71efcf6a7e3cf9e6d6adce75d1d8acc4c7c9
-
SHA512
5ec258deb00b8f67d00a1d1dced72efe96f5da2e4698135f7c991a90df6eb43b6b404e16d587ad2e809b2466797f931117c30229a06a5bd5656b6c1b8bad60bb
-
SSDEEP
3072:UQzdFIJ+KlM80HWcrSI59yIpEWInsZFV/qHQl:UQzdhRfEWIsZI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ebe56bb592b5b0ebbe6bb8aff27fc73_JaffaCakes118
Files
-
3ebe56bb592b5b0ebbe6bb8aff27fc73_JaffaCakes118.exe windows:4 windows x86 arch:x86
8dd5e2b5a768d70bb34f4d2880132346
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
FindNextFileA
FindClose
FreeLibrary
LocalFree
GetVersionExA
MapViewOfFile
UnmapViewOfFile
ExitProcess
CreateFileA
SystemTimeToFileTime
SetFileTime
SetEnvironmentVariableA
CompareStringW
CompareStringA
OpenProcess
SetEndOfFile
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsBadCodePtr
FlushFileBuffers
SetStdHandle
GetSystemInfo
VirtualProtect
InitializeCriticalSection
GetOEMCP
GetACP
GetLocaleInfoA
CopyFileA
GetModuleFileNameA
Sleep
DeleteFileA
GetProcAddress
LoadLibraryA
WideCharToMultiByte
InterlockedDecrement
CreateMutexA
CloseHandle
GetLastError
ReleaseMutex
FormatMessageA
GetCPInfo
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
VirtualQuery
InterlockedExchange
IsBadWritePtr
VirtualAlloc
SetFilePointer
ReadFile
GetTimeZoneInformation
LCMapStringW
LCMapStringA
EnterCriticalSection
LeaveCriticalSection
VirtualFree
HeapDestroy
DeleteCriticalSection
MultiByteToWideChar
lstrlenA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetSystemTimeAsFileTime
IsBadReadPtr
HeapFree
HeapAlloc
RtlUnwind
RaiseException
HeapReAlloc
TerminateProcess
GetCurrentProcess
HeapSize
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
user32
PostQuitMessage
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
SetWindowTextA
PostMessageA
SetTimer
EnumWindows
EnumChildWindows
GetWindowThreadProcessId
GetClassNameA
FindWindowA
DefWindowProcA
EndPaint
BeginPaint
UpdateWindow
ShowWindow
MessageBoxA
CreateWindowExA
RegisterClassExA
advapi32
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegCloseKey
SetSecurityInfo
SetEntriesInAclA
GetSecurityInfo
shell32
ShellExecuteA
ole32
CoCreateGuid
CoCreateInstance
CoInitializeEx
oleaut32
SysAllocString
VariantClear
SysFreeString
userenv
GetProfilesDirectoryA
urlmon
CreateURLMoniker
wininet
InternetReadFile
InternetOpenA
InternetSetOptionA
HttpQueryInfoA
InternetCloseHandle
InternetOpenUrlA
netapi32
Netbios
Sections
.text Size: 100KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ