Static task
static1
Behavioral task
behavioral1
Sample
e98f7303ba571cd6bf53222f5c8ce668_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e98f7303ba571cd6bf53222f5c8ce668_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e98f7303ba571cd6bf53222f5c8ce668_JaffaCakes118
-
Size
64KB
-
MD5
e98f7303ba571cd6bf53222f5c8ce668
-
SHA1
61f7dd23f3a6995acf1a74d5e352b879c253d6ab
-
SHA256
3e8f45ff9e2ede7c851ac9d5dee835a1fb72d64c810b7f97651e7bb88f836cea
-
SHA512
e1813f62e71585b2c4d73fd26d86be3f29a77586eb67c79fbc1b9da74f36247627b6cad525814af2ae795e75c715a5f6cdccc3e2f6b648e1e745f07b0e0403be
-
SSDEEP
1536:a4o+5Tn59hVGfo0XTo4MUg+Ul08TImlfCJ1JtyHIyFx9:Xo0V0D2lZ0mlfk1Xyo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e98f7303ba571cd6bf53222f5c8ce668_JaffaCakes118
Files
-
e98f7303ba571cd6bf53222f5c8ce668_JaffaCakes118.exe windows:4 windows x86 arch:x86
c201ec53cf6e5dfe156118fb737f4140
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
CompareStringA
CreateFileA
PeekNamedPipe
GetVersionExA
TlsAlloc
GetEnvironmentStringsW
GlobalUnlock
SetEvent
GetProcAddress
TerminateThread
GetFullPathNameW
ReadFile
SetLastError
WriteConsoleA
GetTimeZoneInformation
CompareStringW
MulDiv
HeapCreate
TerminateProcess
LocalAlloc
RaiseException
GetLongPathNameW
GetModuleHandleW
FindFirstFileW
LCMapStringW
LocalLock
CopyFileW
GlobalSize
FindClose
lstrcpynW
GetSystemInfo
VirtualAlloc
LoadLibraryA
LCMapStringA
SetStdHandle
SetFilePointer
SetEndOfFile
GetLocaleInfoA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
HeapSize
MultiByteToWideChar
GetCPInfo
GetOEMCP
GetACP
CloseHandle
InterlockedExchange
RtlUnwind
GetStringTypeW
GetStringTypeA
IsBadWritePtr
HeapReAlloc
VirtualFree
HeapDestroy
GetFileType
SetHandleCount
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetModuleFileNameA
GetStdHandle
WriteFile
WideCharToMultiByte
GetLastError
VirtualQuery
VirtualProtect
HeapAlloc
GetCurrentProcess
ExitProcess
HeapFree
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
FlushFileBuffers
user32
TrackPopupMenu
IsWindowUnicode
GetMenuStringW
GetWindowTextW
MapWindowPoints
SendMessageW
LoadMenuW
GetMonitorInfoW
IsZoomed
DrawIcon
DragDetect
GetParent
GetDlgItemInt
FrameRect
CreateAcceleratorTableW
TranslateAcceleratorW
DialogBoxParamW
DialogBoxIndirectParamW
CallNextHookEx
MessageBeep
MonitorFromWindow
GetWindowLongW
DrawTextExW
IsWindowVisible
LoadIconW
mouse_event
CharUpperW
CharLowerW
GetCapture
ModifyMenuW
FillRect
SetDlgItemInt
DestroyMenu
GetMessageW
IsWindow
ToAscii
EnableMenuItem
SetScrollRange
SetCursor
GetScrollPos
ScrollWindow
GetScrollRange
IsDialogMessageA
PostMessageW
DrawTextW
GetMenuItemID
DeferWindowPos
wsprintfW
CreateMenu
GetClipboardData
OpenClipboard
DispatchMessageW
DeleteMenu
SetMenu
DrawEdge
CreateWindowExW
ScreenToClient
ClientToScreen
WindowFromPoint
SetMenuItemInfoW
BeginDeferWindowPos
CallWindowProcW
EmptyClipboard
SetCaretPos
RealChildWindowFromPoint
UnhookWindowsHookEx
GetWindowRect
PostQuitMessage
MessageBoxW
CallWindowProcA
SetClipboardData
GetSystemMetrics
EnableWindow
comdlg32
PageSetupDlgW
ChooseFontW
PrintDlgW
ReplaceTextA
ChooseColorW
GetSaveFileNameW
ole32
StgOpenStorage
StgOpenAsyncDocfileOnIFillLockBytes
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ