Static task
static1
Behavioral task
behavioral1
Sample
3ff318e3117f64304ad6e3ae3f1b19ea_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ff318e3117f64304ad6e3ae3f1b19ea_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3ff318e3117f64304ad6e3ae3f1b19ea_JaffaCakes118
-
Size
240KB
-
MD5
3ff318e3117f64304ad6e3ae3f1b19ea
-
SHA1
23f1447a1d4ba45643783afbf30f6f11525af871
-
SHA256
b265dfd3e2ab036be574c968527f08728413b12a25e379da2b8200251a5ae9fc
-
SHA512
596bce854b70a41371721214147b5adf61c89869ca61d546e5667052c7dc1854f488bc3eaafbba10771d7f3966f8a66c02a80831a16f0baa0e23231750435472
-
SSDEEP
6144:tpRqvCaXtLkLHVlpQI+pKQVZDERnsVVoA5mQ3h3+vZtkMMnMMMMMaw9KvaWS2vqT:tCDdwLHWpK6pansVmu3h3+/kMMnMMMMk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ff318e3117f64304ad6e3ae3f1b19ea_JaffaCakes118
Files
-
3ff318e3117f64304ad6e3ae3f1b19ea_JaffaCakes118.exe windows:4 windows x86 arch:x86
c3c910b26528e0c8b99c0eba9a39c899
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExA
RegCreateKeyW
RegSetValueExW
RegCloseKey
RegSetValueExA
OpenProcessToken
RegQueryInfoKeyA
RegDeleteValueA
RegDeleteKeyW
ReportEventA
RegisterEventSourceA
SetSecurityDescriptorDacl
RegSetValueA
DeregisterEventSource
RegOpenKeyExA
LookupPrivilegeValueA
RegOpenKeyW
RegEnumKeyW
RegOpenKeyA
RegDeleteValueW
RegEnumValueW
RegCreateKeyA
RegQueryValueExW
RegDeleteKeyA
RegEnumValueA
InitializeSecurityDescriptor
AdjustTokenPrivileges
RegEnumKeyA
RegQueryValueA
kernel32
SetErrorMode
FileTimeToLocalFileTime
_llseek
SystemTimeToFileTime
GetModuleFileNameW
WriteFile
GetSystemDefaultLCID
SetEnvironmentVariableA
GetDateFormatA
HeapAlloc
GetDriveTypeA
HeapDestroy
GetSystemDirectoryA
GlobalDeleteAtom
FreeEnvironmentStringsW
GetVolumeInformationA
GetUserDefaultLCID
SetEndOfFile
lstrcmpiW
GetACP
MoveFileA
CreateFileA
EnterCriticalSection
InterlockedIncrement
DuplicateHandle
ReadFile
CreateProcessA
_lwrite
WideCharToMultiByte
RtlUnwind
TlsFree
GetSystemDefaultLangID
CreateSemaphoreA
SetCurrentDirectoryA
InitializeCriticalSection
IsDBCSLeadByte
FlushInstructionCache
HeapCreate
GetCurrentProcessId
DeleteFileA
FreeResource
InterlockedDecrement
HeapFree
GetTempFileNameA
GetFileType
LoadResource
GetLocaleInfoA
SetHandleCount
GetTickCount
GetCommandLineA
GetCurrentProcess
GetVersionExA
lstrcmpA
GlobalSize
FreeLibrary
GetCurrentDirectoryA
CreateThread
GlobalAddAtomA
FormatMessageA
ResumeThread
GetTempPathA
FileTimeToSystemTime
CreateProcessW
CloseHandle
FindResourceA
GetEnvironmentStringsW
ExitProcess
Sleep
ExitThread
GlobalLock
UnlockFile
CompareStringW
VirtualFree
SearchPathA
SetEvent
_lclose
GetLastError
GlobalFree
LoadLibraryExA
ResetEvent
GetModuleFileNameA
SetLastError
VirtualAlloc
FindFirstFileA
lstrcpyA
WaitForSingleObject
GetStdHandle
FlushFileBuffers
SetStdHandle
LockFile
GetShortPathNameA
SizeofResource
LCMapStringA
GetEnvironmentStrings
SetFileAttributesA
RaiseException
GetSystemTime
GetCPInfo
LeaveCriticalSection
IsBadCodePtr
GetUserDefaultLangID
LockResource
LoadLibraryA
GetStringTypeA
GetTimeZoneInformation
DeleteCriticalSection
FormatMessageW
UnhandledExceptionFilter
GetFileAttributesA
GetSystemInfo
CreateDirectoryA
FreeEnvironmentStringsA
GlobalUnlock
GetStringTypeExA
GlobalHandle
FindNextFileA
_lread
CreateEventA
IsBadReadPtr
HeapReAlloc
lstrcatA
VirtualQuery
GlobalAlloc
lstrcpynA
lstrcmpiA
VirtualProtect
GetStartupInfoA
GetProcAddress
CompareStringA
GetCurrentThreadId
WinExec
GetProfileStringA
GetFullPathNameA
MulDiv
GetWindowsDirectoryA
lstrlenA
GetVersion
GetLocalTime
SetLocalTime
GetStringTypeW
GetExitCodeProcess
TlsGetValue
FindClose
GetFileTime
TlsAlloc
LCMapStringW
RemoveDirectoryA
GetOEMCP
SetFilePointer
MultiByteToWideChar
GlobalReAlloc
ReleaseSemaphore
SetFileTime
TerminateProcess
HeapSize
GetModuleHandleA
TlsSetValue
ole32
OleLoad
OleSave
ddraw
DirectDrawEnumerateA
ws2_32
WSAConnect
setsockopt
samlib
SamLookupNamesInDomain
SamConnect
SamConnectWithCreds
user32
GetMenuItemID
GetClassInfoExA
DdeGetData
PeekMessageA
WaitMessage
GetPropA
EndDialog
DestroyIcon
VkKeyScanW
GetDoubleClickTime
OemToCharA
CharPrevA
GetForegroundWindow
CharNextA
GetDC
GetWindowDC
DefMDIChildProcA
EnableWindow
GetSubMenu
GetAsyncKeyState
SendMessageA
DrawMenuBar
LoadBitmapA
GetWindowLongA
LoadImageA
AdjustWindowRectEx
BringWindowToTop
MessageBoxIndirectA
UpdateWindow
DrawFrameControl
ReleaseCapture
GetQueueStatus
DispatchMessageA
MessageBeep
IsRectEmpty
CopyAcceleratorTableA
GetSystemMetrics
DdeQueryStringA
BeginDeferWindowPos
IsWindow
DialogBoxParamA
AdjustWindowRect
GetWindowThreadProcessId
CreatePopupMenu
LoadIconA
GetWindowRect
IsWindowEnabled
SetWindowsHookExW
keybd_event
GetDCEx
IsWindowVisible
LoadStringA
DdeCmpStringHandles
PtInRect
GetMenu
GetCaretPos
GetUpdateRgn
PeekMessageW
SubtractRect
VkKeyScanA
CheckMenuItem
DestroyWindow
IsIconic
GetWindow
DefFrameProcA
RemoveMenu
GetMenuState
SetMenu
GetKeyboardState
SetRect
CreateAcceleratorTableA
GetMenuItemInfoA
DdeQueryConvInfo
GetUpdateRect
GetIconInfo
SendDlgItemMessageA
GetCursor
TabbedTextOutA
InsertMenuA
DestroyMenu
DeleteMenu
GetSystemMenu
EnumClipboardFormats
ShowWindow
AppendMenuA
KillTimer
SetWindowPos
PostThreadMessageA
LockWindowUpdate
TrackPopupMenu
SetWindowContextHelpId
SetCapture
SetWindowRgn
DeferWindowPos
FindWindowW
GetClassNameA
SetWindowLongA
DestroyCursor
CharUpperBuffW
CreateMenu
MoveWindow
ClientToScreen
DdeCreateStringHandleA
ShowCursor
SetMenuDefaultItem
ScreenToClient
GetMenuItemCount
PostMessageA
DdeDisconnect
GetWindowTextA
FindWindowA
GetKeyboardLayout
CloseClipboard
GetCursorPos
DdePostAdvise
FillRect
CharUpperA
CreateCursor
GetDlgItem
GetScrollPos
CharLowerBuffA
EnableMenuItem
SetForegroundWindow
DrawFocusRect
GetLastActivePopup
CharToOemBuffA
IntersectRect
RegisterClipboardFormatA
CallNextHookEx
GetClipboardData
GetMessagePos
SetCaretPos
DrawIcon
DdeFreeDataHandle
DdeSetUserHandle
EndPaint
WindowFromPoint
SetFocus
AttachThreadInput
SetCursor
GetTabbedTextExtentA
InvalidateRgn
DdeInitializeA
RegisterClassA
CharLowerBuffW
GetParent
LoadCursorA
wsprintfA
GetFocus
CopyRect
RegisterClassExA
CharLowerA
CreateIcon
SystemParametersInfoA
ToAscii
IsZoomed
SetMenuItemInfoA
DestroyAcceleratorTable
MessageBoxA
ClipCursor
IsClipboardFormatAvailable
RemovePropA
GetClipboardFormatNameA
DdeGetLastError
DdeUninitialize
CreateCaret
GetDesktopWindow
MsgWaitForMultipleObjects
MapWindowPoints
CharUpperBuffA
ShowCaret
DdeConnect
OpenClipboard
DestroyCaret
UnregisterClassA
SetKeyboardState
DdeCreateDataHandle
DefWindowProcA
BeginPaint
InflateRect
IsDialogMessageA
PostMessageW
OffsetRect
ReleaseDC
GetActiveWindow
TranslateMessage
FrameRect
SetCursorPos
SetDlgItemTextA
SetWindowsHookExA
WinHelpA
EqualRect
DdeNameService
GetScrollInfo
SetParent
CreateDialogParamA
InvalidateRect
SetClipboardData
SetScrollRange
HideCaret
CreateWindowExA
EndDeferWindowPos
TranslateMDISysAccel
EnumThreadWindows
SetScrollInfo
DdeAbandonTransaction
GetMessageTime
ShowScrollBar
EmptyClipboard
CallWindowProcA
SetScrollPos
GetCapture
DrawTextA
DdeClientTransaction
GetClassInfoA
GetWindowTextLengthA
GetClientRect
SetTimer
SetWindowTextA
SetPropA
ModifyMenuA
GetCaretBlinkTime
GetSysColor
GetMenuStringA
UnhookWindowsHookEx
GetKeyState
SetActiveWindow
CharToOemA
IsChild
PostQuitMessage
WaitForInputIdle
DdeFreeStringHandle
GetWindowRgn
IsCharAlphaA
LoadAcceleratorsA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 155KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 207KB - Virtual size: 207KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ