?COMWndProc@@YGJPAUHWND__@@IIJ@Z
Static task
static1
Behavioral task
behavioral1
Sample
2f98dacdc5088ad781ee70482d232eee_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2f98dacdc5088ad781ee70482d232eee_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2f98dacdc5088ad781ee70482d232eee_JaffaCakes118
-
Size
140KB
-
MD5
2f98dacdc5088ad781ee70482d232eee
-
SHA1
b2cc20c8b29c9de7e49130365d3b2f1c1f01cc0c
-
SHA256
58d4a7bd80a14b0d8f0322691b99ab84b4b031e25949dc729085306233389b4f
-
SHA512
ce18a8fe6482540a63918e918f80a147ff658238561d1fb8136c86ba8d959e652a2831e7bbcd7e68a543cc36951a6642d49cfef626aca910eb4df48940afd399
-
SSDEEP
3072:2Oyreq6OFwy+mNTre6qpwxHjKt7A3jJIhP35l:2jwOFF7pVqpwZe03jKhP35l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f98dacdc5088ad781ee70482d232eee_JaffaCakes118
Files
-
2f98dacdc5088ad781ee70482d232eee_JaffaCakes118.exe windows:4 windows x86 arch:x86
7aa7c50a7e5e4669b52d89f27e3eb64e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MapViewOfFile
CreateFileMappingA
InitializeCriticalSection
DeleteCriticalSection
LoadLibraryA
GetModuleHandleA
GetProcAddress
SetLastError
GetCurrentProcess
LocalFree
LocalAlloc
GetTickCount
CreateFileA
GetCurrentThreadId
RaiseException
UnmapViewOfFile
SetErrorMode
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
GetModuleFileNameA
lstrlenA
lstrcpyA
CloseHandle
GetLastError
InterlockedExchange
lstrlenW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
user32
wsprintfA
SetForegroundWindow
UnregisterClassA
GetWindowLongA
DefWindowProcA
IsWindow
GetWindowRect
LoadBitmapA
EnableWindow
LoadIconA
MessageBoxA
SendMessageA
GetParent
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
ole32
CoCreateInstance
CoInitialize
CoUninitialize
oleaut32
VariantClear
SysAllocString
SysStringByteLen
SysAllocStringByteLen
SysAllocStringLen
SysStringLen
SysFreeString
VariantInit
msvcr80
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
__dllonexit
_encode_pointer
_unlock
_except_handler4_common
?terminate@@YAXXZ
memmove_s
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
_chdir
_getcwd
memset
toupper
floor
??2@YAPAXI@Z
atoi
atol
_localtime64_s
__CxxFrameHandler3
_CxxThrowException
free
??3@YAXPAX@Z
_setmbcp
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_chdrive
_invoke_watson
_controlfp_s
mfc80
ord1327
ord2036
ord5212
ord4280
ord1521
ord4272
ord721
ord3553
ord741
ord2095
ord1591
ord4240
ord2991
ord3317
ord1903
ord4125
ord1280
ord3161
ord1934
ord3210
ord4580
ord2657
ord416
ord1564
ord3875
ord5613
ord2164
ord4583
ord2170
ord4888
ord526
ord3668
ord980
ord3667
ord781
ord300
ord304
ord4067
ord1230
ord6236
ord869
ord4066
ord5873
ord6747
ord5071
ord5072
ord5070
ord4797
ord4617
ord4867
ord4844
ord4190
ord5182
ord4213
ord4736
ord4890
ord2020
ord1671
ord1670
ord1551
ord6724
ord5912
ord1401
ord4244
ord5211
ord4720
ord4262
ord3293
ord516
ord426
ord427
ord718
ord663
ord664
ord783
ord2882
ord6067
ord4353
ord3023
ord5470
ord2370
ord1482
ord6703
ord299
ord1489
ord5871
ord3022
ord5430
ord1882
ord1892
ord1794
ord3879
ord658
ord2092
ord6725
ord5915
ord1620
ord1617
ord3946
ord1402
ord4238
ord5152
ord1908
ord5073
ord6275
ord4185
ord5214
ord3403
ord4722
ord4282
ord1600
ord5960
ord5235
ord5233
ord923
ord928
ord932
ord930
ord934
ord2390
ord2410
ord2394
ord2400
ord2398
ord2396
ord2413
ord2408
ord2392
ord2415
ord2403
ord2385
ord1207
ord1185
ord1084
ord757
ord3683
ord566
ord3333
ord4261
ord4481
ord3949
ord2644
ord3709
ord3719
ord3718
ord2533
ord2646
ord2540
ord2838
ord2714
ord4307
ord2835
ord2731
ord2537
ord5566
ord5213
ord5230
ord4568
ord3948
ord5226
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord2248
ord578
ord1582
ord907
ord911
ord4035
ord310
ord6090
ord2372
ord784
ord870
ord6754
ord6752
ord1063
ord572
ord3230
ord4486
ord2958
ord2862
ord5200
ord1599
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
Exports
Exports
Sections
.text Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.8rdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE