C:\tenTakesauahoxoEmicedantsTostzoahasoms3\JotshadeltlotpiumatedantsTostzoahasoms3\NavyidtoffvasdalSkidRagiTetstzoahasoms3\womejooptcogerbardosaahimumstzoahasoms3\stycisisoxofonyoaicigFazenodivaoeasoms3.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3f0925c1fd8aaefdf93df7ba8f303f44_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3f0925c1fd8aaefdf93df7ba8f303f44_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3f0925c1fd8aaefdf93df7ba8f303f44_JaffaCakes118
-
Size
177KB
-
MD5
3f0925c1fd8aaefdf93df7ba8f303f44
-
SHA1
a3eeec9bf477d757ef7ae440d8271ba3d47cee3f
-
SHA256
0c8f60fd860bae0ddb4fcf9c5c1f42aee00a3f89fc69a1a7d188ef3edbcb6601
-
SHA512
3e70c06089b30fa8f872ebb6c0a4ded1e375e2468ee58cdd5a8590d4d67c05cd699e1c69127fec7483d1aac5be78ef607b32c5e444c415fa0f4b842b96477f4b
-
SSDEEP
3072:J2JPSziqoylUumgeNoDFbQgvuBisXjQIsE66OIT26L8Tz6YAIbKWPikObX7G+uoY:YeXlwgeNkUgGBxXJeI/L8SWPiJYn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f0925c1fd8aaefdf93df7ba8f303f44_JaffaCakes118
Files
-
3f0925c1fd8aaefdf93df7ba8f303f44_JaffaCakes118.exe windows:5 windows x86 arch:x86
7d2eab17020af1e4385543aa031b1e6b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ole32
CoInitialize
gdi32
GetROP2
CreateFontIndirectW
CreateBitmap
SelectObject
EndPage
GetTextExtentPoint32A
RoundRect
StretchDIBits
ScaleWindowExtEx
CreatePalette
EndPath
GetViewportOrgEx
ExcludeClipRect
GetTextFaceW
GetTextExtentPoint32W
LPtoDP
GetStockObject
Escape
DPtoLP
SetMapMode
SetTextColor
SetTextAlign
GetSystemPaletteEntries
SetPaletteEntries
TextOutA
SetViewportOrgEx
GetNearestColor
GetMapMode
SetAbortProc
IntersectClipRect
SetBitmapDimensionEx
CreateBrushIndirect
SetRectRgn
SetWindowExtEx
RectInRegion
CreateFontA
CreatePen
UnrealizeObject
GetPixel
SetDIBitsToDevice
GetClipBox
ResizePalette
StretchBlt
EnumFontFamiliesExW
SetBrushOrgEx
CreateDiscardableBitmap
CreateRectRgnIndirect
Polyline
StartPage
CreateEllipticRgnIndirect
WidenPath
PathToRegion
SetViewportExtEx
ScaleViewportExtEx
user32
AppendMenuW
CreateCaret
IsCharAlphaA
CascadeWindows
DrawEdge
SetSysColors
InsertMenuItemW
RedrawWindow
CheckDlgButton
DestroyWindow
SendMessageW
GetSysColor
MonitorFromRect
GetMenuItemID
CharUpperA
PostThreadMessageW
AppendMenuA
SendMessageA
DispatchMessageA
DrawFrameControl
CreateIconIndirect
HiliteMenuItem
CharUpperBuffW
InSendMessageEx
ScrollWindow
GetFocus
LoadImageW
SetWindowTextW
DrawFocusRect
IsWindowUnicode
GetWindowTextLengthW
IsChild
CharPrevA
TranslateAcceleratorW
CharLowerA
LoadMenuA
LoadIconW
DragObject
GetMenuItemRect
mouse_event
UnloadKeyboardLayout
ShowCursor
CreateAcceleratorTableW
RegisterWindowMessageA
DrawStateA
CharToOemBuffA
ClipCursor
TranslateAcceleratorA
FrameRect
DialogBoxParamW
EndDialog
GetMenuState
CharLowerW
DestroyCursor
GetKeyboardLayout
ExitWindowsEx
EnableWindow
OemToCharBuffA
DefFrameProcW
CharPrevW
LoadCursorA
TrackPopupMenuEx
EnableScrollBar
CharNextA
SetWindowLongW
LoadMenuW
FindWindowA
AllowSetForegroundWindow
DeleteMenu
CheckRadioButton
AdjustWindowRectEx
RemoveMenu
EnumWindows
GetUserObjectInformationA
GetUpdateRect
MonitorFromPoint
GetTopWindow
LockWindowUpdate
ClientToScreen
CallWindowProcW
RemovePropW
FindWindowW
PostMessageW
SetWindowPlacement
PostThreadMessageA
UnionRect
SystemParametersInfoW
DefWindowProcA
GetKeyboardLayoutNameW
GetDesktopWindow
wvsprintfW
CreateDialogIndirectParamW
MessageBoxA
DrawStateW
CheckMenuRadioItem
GetSysColorBrush
ScrollWindowEx
CallWindowProcA
LoadAcceleratorsA
GetWindow
InflateRect
GetIconInfo
InvalidateRect
WaitMessage
GetClassInfoA
GetForegroundWindow
MapVirtualKeyA
SetCursor
SetUserObjectInformationW
GetDlgItemTextW
VkKeyScanW
InsertMenuA
CreateDialogParamA
CreateIconFromResource
GetMessagePos
OffsetRect
BeginDeferWindowPos
LoadIconA
CharNextExA
DefWindowProcW
SetWindowLongA
GetNextDlgTabItem
GetMenuItemCount
kernel32
MulDiv
MoveFileA
LoadResource
GetFileInformationByHandle
SleepEx
IsBadCodePtr
GetFileType
CreatePipe
GetThreadLocale
GetFileTime
GlobalGetAtomNameA
MoveFileExA
SetMailslotInfo
GetStartupInfoW
WaitCommEvent
SetHandleCount
CreateNamedPipeA
lstrcpynW
FindFirstFileW
ReadFile
GetOEMCP
GetCurrentThread
LocalSize
lstrcatW
OpenFile
SetThreadLocale
TryEnterCriticalSection
FreeResource
GlobalFree
GlobalHandle
GetSystemTime
SetEvent
lstrcmpW
GetFileAttributesW
RemoveDirectoryA
SetLocalTime
EnumResourceLanguagesA
MultiByteToWideChar
SetCommBreak
GlobalSize
SetPriorityClass
GetSystemWindowsDirectoryA
SetCurrentDirectoryW
VirtualFree
FlushFileBuffers
ResetEvent
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetComputerNameW
GlobalFindAtomW
GetDateFormatA
GetCPInfo
GetACP
GetBinaryTypeA
GetCurrentThreadId
VirtualProtect
GetDateFormatW
SetHandleInformation
comctl32
ImageList_Write
Sections
.text Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.psikif Size: 1024B - Virtual size: 972B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.yid Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pox Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hob Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Kuduag Size: 512B - Virtual size: 26B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.refee Size: 512B - Virtual size: 231B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ