Static task
static1
Behavioral task
behavioral1
Sample
3f03d25ff07e1bf2b5d3227ac0a95154_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f03d25ff07e1bf2b5d3227ac0a95154_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3f03d25ff07e1bf2b5d3227ac0a95154_JaffaCakes118
-
Size
236KB
-
MD5
3f03d25ff07e1bf2b5d3227ac0a95154
-
SHA1
d3afd1febc6411fb7eeb45120e3d87cfc968589f
-
SHA256
ee111af2adfee07c855cb3bb943c402ab744a5665ba2b9d5235590b11e57e8a9
-
SHA512
429c96178d2998c907a09951393c2f5ab8967069818ad1bab75fe1f1f6fd09fc3b29675834efbfb611ae776830362f22742c86d289f4587893e1ec750d503387
-
SSDEEP
3072:LX4Fg4S024dqkh2PUZIkRoDBDcEGao4ieiB6EIvFNKEoRsWYXMIOYursrk:iQ4d5h+UZtqsYXMd4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f03d25ff07e1bf2b5d3227ac0a95154_JaffaCakes118
Files
-
3f03d25ff07e1bf2b5d3227ac0a95154_JaffaCakes118.exe windows:4 windows x86 arch:x86
1273517bce4338d1849d57d36bd6036c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
inet_addr
htons
gethostbyname
connect
WSAStartup
WSACleanup
WSAGetLastError
socket
kernel32
LocalReAlloc
TlsGetValue
GlobalFlags
EnterCriticalSection
TlsSetValue
GetProcessVersion
GetFileSize
GetFileTime
WritePrivateProfileStringA
GetOEMCP
SetErrorMode
RtlUnwind
GetStartupInfoA
GetCommandLineA
HeapFree
CreateThread
ExitThread
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetACP
RaiseException
HeapReAlloc
GetCPInfo
TlsFree
InterlockedDecrement
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalReAlloc
LeaveCriticalSection
TlsAlloc
GlobalHandle
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
GetFullPathNameA
FindClose
GetVolumeInformationA
FindFirstFileA
LockFile
SetEndOfFile
UnlockFile
ReadFile
FlushFileBuffers
SetFilePointer
LocalFree
DuplicateHandle
GetVersion
lstrcpynA
LoadLibraryA
GlobalAddAtomA
lstrcatA
GlobalGetAtomNameA
MulDiv
GlobalFindAtomA
lstrcpyA
SetLastError
GetModuleHandleA
GetProcAddress
GlobalFree
FreeLibrary
GlobalUnlock
InterlockedIncrement
MultiByteToWideChar
WideCharToMultiByte
HeapSize
FileTimeToLocalFileTime
LockResource
FindResourceA
FileTimeToSystemTime
CreateEventA
SuspendThread
SetThreadPriority
ResumeThread
SetEvent
WaitForSingleObject
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GetFileAttributesA
DeleteFileA
MoveFileA
OpenProcess
SizeofResource
TerminateProcess
lstrlenA
GetCurrentProcess
GetVersionExA
Sleep
GetExitCodeThread
GetModuleFileNameA
GetWindowsDirectoryA
WinExec
CopyFileA
ExitProcess
CreateMutexA
GetLastError
GetSystemDirectoryA
UnhandledExceptionFilter
LoadResource
CloseHandle
WriteFile
CreateFileA
user32
GetMenuItemID
GetSubMenu
GetMenuItemCount
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
GetWindowTextA
GetWindowTextLengthA
IsDlgButtonChecked
IsDialogMessageA
SetWindowTextA
ShowWindow
CharUpperA
GetClassNameA
PtInRect
GetSysColorBrush
LoadStringA
DestroyMenu
CallWindowProcA
RemovePropA
GetMessageTime
LoadCursorA
GetDlgCtrlID
SetWindowLongA
RegisterWindowMessageA
GetWindowPlacement
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
ClientToScreen
SetWindowPos
WindowFromPoint
ScreenToClient
WaitMessage
EndDialog
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
UnhookWindowsHookEx
DefWindowProcA
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
IsWindow
GetWindowThreadProcessId
ExitWindowsEx
EnableWindow
PeekMessageA
wsprintfA
GetWindow
GetWindowLongA
LoadImageA
GetDC
GetWindowRect
FillRect
InvalidateRect
KillTimer
GetDesktopWindow
BlockInput
IsIconic
SetTimer
FindWindowA
SendMessageA
LoadIconA
GetSystemMetrics
SystemParametersInfoA
CreateWindowExA
GetClassLongA
SetPropA
SetForegroundWindow
GetMessagePos
GetPropA
GetForegroundWindow
GetMenuCheckMarkDimensions
CheckMenuItem
EnableMenuItem
ReleaseDC
UnregisterClassA
gdi32
DeleteObject
CreateSolidBrush
StretchBlt
SelectObject
GetObjectA
CreateCompatibleDC
CreateBitmap
DeleteDC
SaveDC
RestoreDC
GetStockObject
SetBkColor
SetBkMode
SetROP2
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
GetDeviceCaps
PtVisible
RectVisible
ExtTextOutA
Escape
TextOutA
DPtoLP
CreateFontIndirectA
comdlg32
GetFileTitleA
GetSaveFileNameA
GetOpenFileNameA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCreateKeyExA
RegSetValueExA
AdjustTokenPrivileges
GetTokenInformation
OpenProcessToken
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
comctl32
ord17
ole32
CoUninitialize
CoCreateInstance
CoInitialize
wsock32
accept
inet_ntoa
WSAAsyncSelect
sendto
WSASetLastError
recv
send
recvfrom
closesocket
Sections
.text Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ