Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f3c204dc2a65cb66594415b615b08ed4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f3c204dc2a65cb66594415b615b08ed4.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f3c204dc2a65cb66594415b615b08ed4
-
Size
242KB
-
MD5
f3c204dc2a65cb66594415b615b08ed4
-
SHA1
627d8cf09bcb35deddb73f3f56b65c9a7f91a397
-
SHA256
28998af367fd0f00a6139669e1246654c01c940fa0d6d603cbfbdd70261a1bd2
-
SHA512
576a80e0c3ce362421f1f6ad7a28e7f842a3c6249f2c46fd7030d783c97d77a8e851021f8c8a699f76ba10f2eed7e9c0085c6377a7ea0d3a4715e17b5b7e62dd
-
SSDEEP
6144:DvZR8D2L+mqP/lH8nNnlfttDkJsZLX0tTMPd/:DvZiqL+mUwXTIoLX0tgPd/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_f3c204dc2a65cb66594415b615b08ed4
Files
-
JaffaCakes118_f3c204dc2a65cb66594415b615b08ed4.exe windows:4 windows x86 arch:x86
877a9fc2fb535473e4afdd10f8d5f137
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FatalAppExitA
GetVersionExW
GetCurrentThreadId
GetProcAddress
CreateMutexA
ReplaceFileW
LoadLibraryExA
lstrcpyW
GetSystemDefaultLCID
IsDebuggerPresent
HeapCreate
CreatePipe
GetEnvironmentVariableA
FindResourceW
lstrlenA
GetThreadPriority
FindAtomW
GetCPInfo
GetTempFileNameA
user32
EndMenu
CreatePopupMenu
MonitorFromWindow
CreateMenu
AdjustWindowRect
WinHelpA
InsertMenuItemA
MoveWindow
GetMenuInfo
LoadMenuA
DialogBoxParamW
GetKeyboardLayout
GetKeyState
GetDCEx
IsMenu
UpdateLayeredWindow
EnableWindow
CreateDialogParamA
RegisterClassW
DefWindowProcA
GetSubMenu
PostQuitMessage
CharLowerA
GetActiveWindow
CopyRect
RegisterWindowMessageW
LoadCursorA
LoadImageA
SendDlgItemMessageW
GetCursorPos
WaitMessage
GetFocus
OpenClipboard
UnregisterClassW
CreateDialogIndirectParamW
GetCaretPos
FindWindowA
SetActiveWindow
CharUpperW
GetWindowRgn
keybd_event
DestroyIcon
GetClassInfoExA
GetDesktopWindow
FindWindowW
LoadBitmapA
LoadIconW
EnumClipboardFormats
GetIconInfo
IsIconic
AppendMenuW
RegisterClassA
SetWindowPos
MessageBeep
LoadMenuW
CreateWindowExW
MessageBoxW
GetMenuItemInfoW
SendDlgItemMessageA
GetDlgItemInt
CharLowerW
DestroyMenu
GetMenuItemRect
MonitorFromRect
GetClassInfoExW
RegisterClassExW
GetDlgItemTextA
GetCapture
MonitorFromPoint
IsChild
GetScrollPos
CharPrevA
SetDlgItemTextA
TrackPopupMenu
DestroyCursor
CreateAcceleratorTableA
MessageBoxA
RegisterWindowMessageA
IsDlgButtonChecked
gdi32
RemoveFontResourceA
CreateHatchBrush
CreatePolygonRgn
CreateColorSpaceW
GetEnhMetaFileW
CreateDIBPatternBrushPt
CreateFontIndirectA
CreateDIBPatternBrush
shell32
ExtractAssociatedIconExW
StrRChrA
ExtractIconW
ShellExecuteExA
SHGetDiskFreeSpaceExW
FreeIconList
ShellExecuteEx
StrRStrIW
SHCreateDirectoryExA
SHGetDataFromIDListW
SHGetDiskFreeSpaceA
StrStrIA
StrNCmpIA
StrRStrW
ShellExecuteW
Sections
.U Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.jC Size: 4KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.LRK Size: 1KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.g Size: 3KB - Virtual size: 486KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ucKPZR Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pWz Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.o Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sjcOq Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.an Size: 12KB - Virtual size: 377KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.l Size: 2KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ