Static task
static1
Behavioral task
behavioral1
Sample
98edd0f1c2251273ed3c155d9e58ae69_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
98edd0f1c2251273ed3c155d9e58ae69_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
98edd0f1c2251273ed3c155d9e58ae69_JaffaCakes118
-
Size
2.2MB
-
MD5
98edd0f1c2251273ed3c155d9e58ae69
-
SHA1
c88aad9fe4edbdc9a7891fdfbca044ab08d1ba47
-
SHA256
9ef3a5b384538cd136af17317c5a3af39c34cbd0704a83b5fd68758aed04a26f
-
SHA512
7f6695fabf4e758da71e3dd3c1e590be5b20bd5b6f92fbf0d27975a3e8bbdabd0baf99a1defe1fe0a30e60d5eee51dce6dac1d3d06ead2b97108928cb72287e0
-
SSDEEP
24576:rmB1ViWsdcz0fHZnPW9avlPg1900whdbRJqcIKxQdcnjATd2fp:rmBgGiPwadIP6dOK+c+Q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 98edd0f1c2251273ed3c155d9e58ae69_JaffaCakes118
Files
-
98edd0f1c2251273ed3c155d9e58ae69_JaffaCakes118.exe windows:5 windows x86 arch:x86
4a564031e2bc24ad681db11bf0bf5fa7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SystemParametersInfoW
MapDialogRect
IsDialogMessageW
LoadCursorW
FindWindowExW
GetParent
SetRect
FillRect
DrawFocusRect
ChildWindowFromPoint
MapWindowPoints
GetScrollRange
SetScrollPos
RedrawWindow
GetUpdateRect
SetActiveWindow
SetMenuInfo
CreatePopupMenu
GetDlgItemTextW
GetDlgItemInt
EndDialog
BringWindowToTop
AnimateWindow
ShowWindow
GetClassInfoExW
PeekMessageW
kernel32
GetStartupInfoW
CreateFileW
CloseHandle
WriteConsoleW
SetFilePointerEx
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LCMapStringW
HeapSize
HeapReAlloc
HeapAlloc
GetStringTypeW
OutputDebugStringW
RtlUnwind
LoadLibraryExW
GetVersion
VirtualAlloc
HeapFree
GetEnvironmentStringsW
WaitForMultipleObjects
GetFileType
GetFileSize
SetFilePointer
FileTimeToSystemTime
CreateWaitableTimerW
GetModuleHandleW
GetProcessVersion
GlobalFindAtomW
GetSystemDirectoryW
DeleteFileW
GetConsoleWindow
GetCommandLineW
RaiseException
EncodePointer
GetLastError
SetLastError
GetCurrentThreadId
DecodePointer
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
DeleteCriticalSection
LeaveCriticalSection
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
IsProcessorFeaturePresent
IsDebuggerPresent
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
EnterCriticalSection
ole32
CLSIDFromProgID
CoTaskMemRealloc
PropVariantClear
ReleaseStgMedium
StringFromCLSID
Sections
.text Size: 98KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 620KB - Virtual size: 7.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 1024B - Virtual size: 724B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.geuuu Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.odhop Size: 432KB - Virtual size: 432KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.5cewh9 Size: 421KB - Virtual size: 421KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.558n Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 362KB - Virtual size: 362KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ