Static task
static1
Behavioral task
behavioral1
Sample
3ef64c4ecd57cbb610bc266a7f746f6c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ef64c4ecd57cbb610bc266a7f746f6c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3ef64c4ecd57cbb610bc266a7f746f6c_JaffaCakes118
-
Size
103KB
-
MD5
3ef64c4ecd57cbb610bc266a7f746f6c
-
SHA1
f74225de13612a9e6a74c1ce4998cf411790e9ce
-
SHA256
cf451c46ad18f83a09ce7144f78296362e73d81c4bae1891e37adc37fa5012c8
-
SHA512
e8b2874b31bd14afc07fa7abbf5135f85cf36e2ca748c380d770ccc7bcca3cd4eb2fd0953584678d164039b37b7fa1c8b9b6cca423fe067b54b6445ad92d4a63
-
SSDEEP
1536:ohAiZhsHwLIBonPQkScNF1pa8gnKlRZDfInmxY5lHkxrhC:oh5Zh4wMuPMq0qDsmx+O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ef64c4ecd57cbb610bc266a7f746f6c_JaffaCakes118
Files
-
3ef64c4ecd57cbb610bc266a7f746f6c_JaffaCakes118.exe windows:4 windows x86 arch:x86
ffca4ed3b5b6907540b2c5f3ceae0dbd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetMenuStringA
DispatchMessageA
CharLowerBuffA
DefMDIChildProcA
CreateMenu
DrawIconEx
FillRect
EnableWindow
MessageBoxA
GetActiveWindow
GetKeyNameTextA
SetCursor
GetDlgItem
GetClipboardData
EnumChildWindows
GetCapture
GetSysColor
ShowWindow
EqualRect
IsWindowVisible
DrawFrameControl
SetWindowPos
GetIconInfo
BeginPaint
CallNextHookEx
DrawTextA
DeferWindowPos
IsMenu
EndPaint
DefWindowProcA
GetLastActivePopup
EnumThreadWindows
CheckMenuItem
GetScrollPos
TrackPopupMenu
GetCursorPos
EnableScrollBar
SetWindowLongA
CallWindowProcA
DispatchMessageW
IsWindowEnabled
DefFrameProcA
FrameRect
SetWindowTextA
EndDeferWindowPos
GetMenuItemCount
EnumWindows
GetWindow
GetCursor
GetKeyState
ClientToScreen
ShowScrollBar
GetMessagePos
GetDesktopWindow
CreateIcon
IsChild
GetScrollRange
GetParent
CharNextA
msvcrt
cos
memmove
strncmp
kernel32
RaiseException
CloseHandle
GlobalFindAtomA
GetCurrentThread
LockResource
HeapDestroy
WideCharToMultiByte
GetFileSize
GetProcAddress
SetEndOfFile
CreateFileA
MoveFileA
GetLocalTime
ReadFile
GetVersionExA
FreeResource
VirtualAlloc
SizeofResource
GetStartupInfoA
GetDateFormatA
GetStdHandle
GlobalDeleteAtom
GetSystemDefaultLangID
GlobalAlloc
MulDiv
Sleep
SetThreadLocale
EnterCriticalSection
DeleteFileA
GetCurrentThreadId
VirtualFree
VirtualQuery
ResetEvent
GetCPInfo
FindClose
GlobalAddAtomA
GetCurrentProcessId
LoadLibraryA
LoadResource
LocalReAlloc
GetFileType
ExitProcess
InitializeCriticalSection
SetLastError
WriteFile
HeapFree
GetACP
VirtualAllocEx
GetStringTypeW
FindResourceA
HeapAlloc
GetDiskFreeSpaceA
CreateEventA
lstrcmpiA
FormatMessageA
GetTickCount
GetEnvironmentStrings
CreateThread
lstrlenA
WaitForSingleObject
FreeLibrary
MoveFileExA
GetFullPathNameA
GetOEMCP
lstrcpynA
LocalAlloc
SetErrorMode
GetProcessHeap
GetCommandLineA
LoadLibraryExA
GetUserDefaultLCID
GetFileAttributesA
GetModuleHandleA
DeleteCriticalSection
ExitThread
lstrcatA
GetLocaleInfoA
CompareStringA
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.init Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE