Static task
static1
Behavioral task
behavioral1
Sample
3efa7ee14ecbaea887a4026f598c4fdc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3efa7ee14ecbaea887a4026f598c4fdc_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3efa7ee14ecbaea887a4026f598c4fdc_JaffaCakes118
-
Size
356KB
-
MD5
3efa7ee14ecbaea887a4026f598c4fdc
-
SHA1
a5c1a51263c4d5d8839050530bdd6853cf0e08e8
-
SHA256
f66ea7be76c80e01bc9d1f90ea5040c5a477c27f18fc462bec3a97167dfab245
-
SHA512
80f038c5439dfa7a00fe7ffcc2e8dcdd9029df4359092a81e5ac553bebd53e967e1f9c5dc193e2796263fb872acaab1e108eacc7a7eeaf814ca007490cef82e6
-
SSDEEP
6144:jaY6k+ZOGZ+1N3jFLJa0vn6qY0zONdAd2xPFFFF:jaY6kkMTzR7ncvxPFFFF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3efa7ee14ecbaea887a4026f598c4fdc_JaffaCakes118
Files
-
3efa7ee14ecbaea887a4026f598c4fdc_JaffaCakes118.exe windows:4 windows x86 arch:x86
74e064b3f848619d178d4ba29b626cf4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
CloseHandle
WriteFile
CreateFileA
SetFilePointer
ReadFile
FindClose
GetLastError
FindNextFileA
FreeLibrary
EndUpdateResourceA
UpdateResourceA
SizeofResource
BeginUpdateResourceA
LockResource
LoadResource
FlushViewOfFile
CopyFileA
FreeResource
FindResourceExA
VirtualProtect
GetProcAddress
SetLastError
GetStringTypeA
LCMapStringW
LCMapStringA
GetModuleHandleW
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
HeapAlloc
RtlUnwind
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetStringTypeW
GetCurrentProcess
TerminateProcess
HeapFree
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetFileSize
GlobalAlloc
GlobalFree
LoadLibraryA
GetTempPathA
VirtualAlloc
GetModuleHandleA
Sleep
CreateMutexA
MultiByteToWideChar
VirtualFree
user32
DefWindowProcA
GetClientRect
CreateWindowExA
ShowWindow
MoveWindow
GetWindowLongA
GetDC
UpdateWindow
LoadCursorA
RegisterClassExA
GetIconInfo
GetMessageA
TranslateAcceleratorA
TranslateMessage
LoadAcceleratorsA
IsWindow
IsWindowVisible
LoadIconA
DrawIcon
DestroyIcon
ReleaseDC
CreateIconIndirect
EndDialog
LoadStringA
DialogBoxParamA
DestroyWindow
BeginPaint
DrawTextA
EndPaint
PostQuitMessage
DispatchMessageA
gdi32
CreateCompatibleBitmap
GetObjectA
CreateDCA
CreateSolidBrush
CreatePen
Rectangle
SelectObject
DeleteObject
EnumObjects
GetDIBits
ole32
CoUninitialize
CoInitialize
pdh
PdhCollectQueryData
PdhAddCounterA
PdhOpenQueryA
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 579KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sdata Size: 259KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mss Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.msl Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ems Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ead Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.efx Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE