Static task
static1
Behavioral task
behavioral1
Sample
3f000841b6ea8d5dc9692110b96d18ac_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f000841b6ea8d5dc9692110b96d18ac_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3f000841b6ea8d5dc9692110b96d18ac_JaffaCakes118
-
Size
506KB
-
MD5
3f000841b6ea8d5dc9692110b96d18ac
-
SHA1
46f99a3443b5c402f517f42dc30ae34a9c889ac2
-
SHA256
af73f3a35b277ff58b3c6c9b03ae5a381fb6d4a2feac26034c7806b019464679
-
SHA512
04e008b320fdb291a2448eea2fff20a0b665b92f66d8ed7a6419d466b90016b5a418f04b30a8eb81dcdc113665ca760a4917ecfc8e0c52141711698bd2e13e98
-
SSDEEP
768:v4lv0ZuO7hfF1EjjAihvL5DNpQPxPhyqVMK12sGpZZ7yYNt1d3808yyyf:YObtaQPCKMsGnZJd380zb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f000841b6ea8d5dc9692110b96d18ac_JaffaCakes118
Files
-
3f000841b6ea8d5dc9692110b96d18ac_JaffaCakes118.exe windows:0 windows x86 arch:x86
77dc3f8ce36d268d8b3c9ea3afa74ce1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
BaseDumpAppcompatCache
BaseInitAppcompatCache
BeginUpdateResourceA
CompareFileTime
CreateEventA
CreateFiber
CreateFileA
CreateNamedPipeW
CreatePipe
CreateProcessW
CreateSemaphoreA
CreateToolhelp32Snapshot
DebugActiveProcess
DeleteAtom
DeleteFiber
EnumLanguageGroupLocalesA
EnumResourceLanguagesW
EnumSystemLocalesW
EnumTimeFormatsW
EnumUILanguagesW
EraseTape
ExitVDM
ExpandEnvironmentStringsA
FindFirstVolumeA
FindNextChangeNotification
FindNextFileA
FindNextVolumeMountPointW
FindVolumeClose
FoldStringA
FreeLibrary
FreeUserPhysicalPages
GenerateConsoleCtrlEvent
GetACP
GetAtomNameW
GetBinaryTypeW
GetComPlusPackageInstallStatus
GetCommConfig
GetCommandLineW
GetConsoleAliasExesLengthA
GetConsoleCommandHistoryA
GetConsoleCommandHistoryLengthA
GetCurrentActCtx
GetCurrentProcess
GetCurrentProcessId
GetDevicePowerState
GetDriveTypeW
GetEnvironmentStringsW
GetFileAttributesExA
GetFileAttributesExW
GetFileSizeEx
GetLogicalDrives
GetLongPathNameA
GetModuleFileNameA
GetModuleHandleA
GetNamedPipeInfo
GetNextVDMCommand
GetNumberOfConsoleMouseButtons
GetPrivateProfileIntW
GetPrivateProfileStructA
GetPrivateProfileStructW
GetProcAddress
GetProcessWorkingSetSize
GetProfileStringA
GetSystemDirectoryA
GetSystemPowerStatus
GetSystemWow64DirectoryW
GetTapePosition
GetThreadSelectorEntry
GetTickCount
GetTimeFormatA
GetTimeZoneInformation
GlobalAlloc
GlobalFindAtomA
GlobalFlags
Heap32First
HeapFree
HeapReAlloc
InitializeSListHead
InvalidateConsoleDIBits
IsBadWritePtr
IsDebuggerPresent
LoadLibraryA
LocalFileTimeToFileTime
LocalFree
LocalReAlloc
LockResource
MoveFileExA
MoveFileWithProgressA
MultiByteToWideChar
NlsConvertIntegerToString
OpenFileMappingA
PeekConsoleInputW
PrivMoveFileIdentityW
ProcessIdToSessionId
RaiseException
ReadConsoleOutputCharacterA
ReadFileScatter
RegisterWaitForSingleObjectEx
RegisterWowBaseHandlers
RegisterWowExec
ReleaseActCtx
RestoreLastError
RtlMoveMemory
RtlZeroMemory
SearchPathA
SearchPathW
SetCommMask
SetCommState
SetComputerNameExA
SetComputerNameExW
SetConsoleIcon
SetConsoleLocalEUDC
SetConsoleMaximumWindowSize
SetConsoleNlsMode
SetCriticalSectionSpinCount
SetEvent
SetFilePointerEx
SetFileShortNameW
SetFirmwareEnvironmentVariableA
SetFirmwareEnvironmentVariableW
SetLocalPrimaryComputerNameA
SetMessageWaitingIndicator
SetProcessWorkingSetSize
SetSystemTime
SetSystemTimeAdjustment
SetThreadAffinityMask
SetThreadLocale
SetThreadUILanguage
SignalObjectAndWait
TerminateThread
UTUnRegister
VerifyVersionInfoA
VirtualFree
WaitCommEvent
WaitForSingleObject
WriteConsoleInputA
WriteConsoleOutputAttribute
WritePrivateProfileSectionW
_lclose
lstrcatW
lstrcpyn
lstrlen
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ