c:\sjeop\epeohmvsfy\ebitgnptym\kfzihjpf\rxneee\enw
Static task
static1
Behavioral task
behavioral1
Sample
f96abd5408cd8f1507e9652ee6279997_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f96abd5408cd8f1507e9652ee6279997_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f96abd5408cd8f1507e9652ee6279997_JaffaCakes118
-
Size
584KB
-
MD5
f96abd5408cd8f1507e9652ee6279997
-
SHA1
80ca209c2d8d0ef8b483d024a30e7f24ca403a7c
-
SHA256
9c8eb114538bee4b7708d10063012ee1e6891df3aae22722d54bf1230ab1ea9f
-
SHA512
b21bbeeb62a6db0d593c6fe7eb87280927011f9ea950d96ed0731c28f3c8bf47dbe436b6d313d2d91e5697d5108aad50d1a25ad51abe3c1f1d4f7cdbc0f724e6
-
SSDEEP
12288:6bV47TYpr25qLoGKdaGHstKdDSO5onpM7DH2xALiTL2i67Lz0/f:6bmYpVLoGKHsAh5eavwALG2i6A/f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f96abd5408cd8f1507e9652ee6279997_JaffaCakes118
Files
-
f96abd5408cd8f1507e9652ee6279997_JaffaCakes118.exe windows:4 windows x86 arch:x86
4776fd4d0fe9b20994fb6be01d8b7e86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
PrintDlgW
FindTextW
ChooseFontA
GetFileTitleA
user32
SetMessageQueue
GetDlgItemTextA
AppendMenuW
GetWindowTextA
GetDlgItem
GetMonitorInfoW
InvalidateRect
DefWindowProcA
CharUpperA
RegisterClassA
LoadIconW
MessageBoxA
IsDialogMessage
TranslateAcceleratorA
CascadeWindows
ShowWindow
ValidateRect
SendMessageA
SendDlgItemMessageW
MenuItemFromPoint
SetThreadDesktop
LoadMenuIndirectA
GetNextDlgGroupItem
CreateIconFromResource
DestroyWindow
DrawFrameControl
ArrangeIconicWindows
RegisterClassExA
TranslateAcceleratorW
CreateWindowExW
ToAscii
comctl32
ImageList_Remove
ImageList_DragShowNolock
ImageList_GetIcon
CreateToolbar
ImageList_ReplaceIcon
ImageList_Read
DrawStatusText
ImageList_LoadImageA
CreateStatusWindowA
ImageList_Merge
ImageList_DrawEx
ImageList_AddMasked
CreatePropertySheetPageW
InitCommonControlsEx
ImageList_EndDrag
kernel32
GetCommandLineA
LCMapStringA
GetStdHandle
GetEnvironmentStringsW
GetStartupInfoA
GetSystemTime
GetSystemTimeAsFileTime
GetCurrentProcess
RtlUnwind
TlsSetValue
LCMapStringW
VirtualQuery
GetFileType
GetProcAddress
HeapFree
VirtualFree
FlushFileBuffers
TlsFree
InterlockedIncrement
LoadLibraryA
InterlockedExchange
FreeEnvironmentStringsA
DeleteFiber
MultiByteToWideChar
GetTimeZoneInformation
DeleteCriticalSection
GetLocalTime
FreeEnvironmentStringsW
GetThreadPriority
DeleteAtom
WriteFile
EnumSystemCodePagesW
GetStringTypeW
SetEnvironmentVariableA
InitializeCriticalSection
HeapValidate
GetEnvironmentStrings
TlsAlloc
OpenFileMappingW
GetCurrentProcessId
GetLastError
EnterCriticalSection
WideCharToMultiByte
ReadConsoleOutputA
ReadFile
CloseHandle
GetCurrentThread
CreateMutexA
HeapAlloc
CompareStringW
CompareStringA
HeapCreate
GetStringTypeA
GetCPInfo
GetModuleHandleA
DebugBreak
SetStdHandle
FindFirstFileA
SetCurrentDirectoryA
GetModuleFileNameA
GetVersion
SetConsoleCtrlHandler
ExitProcess
SetHandleCount
GetACP
OutputDebugStringA
IsBadReadPtr
SuspendThread
lstrcmpW
SetLastError
GetCurrentThreadId
GetSystemInfo
TlsGetValue
TerminateProcess
InterlockedDecrement
GetProfileIntW
HeapReAlloc
QueryPerformanceCounter
OpenMutexA
LocalAlloc
LeaveCriticalSection
SetFilePointer
GetTickCount
VirtualAlloc
UnhandledExceptionFilter
GetOEMCP
IsBadWritePtr
HeapDestroy
Sections
.text Size: 180KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 264KB - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ