Static task
static1
Behavioral task
behavioral1
Sample
898a78c25862c49968b368da898ae5d6_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
898a78c25862c49968b368da898ae5d6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
898a78c25862c49968b368da898ae5d6_JaffaCakes118
-
Size
857KB
-
MD5
898a78c25862c49968b368da898ae5d6
-
SHA1
77462e469d01b529853d7a86f0c7ec1c2f899a46
-
SHA256
1830993a3cfa1e97f12a36fe19116a50b738b3032c7609502706242608c68703
-
SHA512
881bb7ed34655daf5fc4ddaafe3d8519bb3242762abbad1b9bb270b36dd7d85723f0a979f82fed9924b76ed4187cc8261ef2a60b5910cd16946ce8b7f84e3822
-
SSDEEP
12288:FBh8GE1sTgln4/PfDW12Y10aOu28dmJK6UpUCgzz7GOaQEtgmd:FrMsT0n4/C1bOuXdcK6fCgfkTtg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 898a78c25862c49968b368da898ae5d6_JaffaCakes118
Files
-
898a78c25862c49968b368da898ae5d6_JaffaCakes118.exe windows:5 windows x86 arch:x86
eb7310622fe72aac324295d1ccb74308
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteCriticalSection
LoadResource
DeleteFileW
GetCurrentProcessId
InterlockedExchange
GlobalLock
CreateFileMappingA
RemoveDirectoryW
lstrcmpW
GetShortPathNameW
RaiseException
GetSystemDirectoryW
GetFileTime
lstrcpyW
SystemTimeToFileTime
FreeResource
ReadFile
DuplicateHandle
GetUserDefaultLCID
GetCPInfo
GetModuleFileNameW
GetWindowsDirectoryA
LocalFileTimeToFileTime
LocalFree
LoadLibraryA
InitializeCriticalSection
CreateDirectoryW
SetEndOfFile
LeaveCriticalSection
LocalAlloc
CopyFileW
GetModuleHandleW
VirtualAlloc
EnterCriticalSection
CloseHandle
GetCurrentThread
CompareStringW
GetDriveTypeA
FindNextFileA
FileTimeToLocalFileTime
GetFileType
CreateProcessA
LCMapStringW
CopyFileA
GetVersion
FindFirstFileA
GetEnvironmentStringsA
GetThreadLocale
user32
IsIconic
RegisterWindowMessageA
InvalidateRect
UnhookWindowsHookEx
GetCursorPos
OpenClipboard
SendMessageA
GetDlgItemTextW
GetActiveWindow
LoadBitmapA
GetSysColorBrush
MsgWaitForMultipleObjects
FillRect
DefWindowProcW
ValidateRect
SetDlgItemTextA
SystemParametersInfoW
SetDlgItemTextW
CreatePopupMenu
UnregisterClassA
GetWindowLongA
BeginPaint
OffsetRect
PostMessageW
GetPropW
LoadBitmapW
GetWindowThreadProcessId
EqualRect
DestroyWindow
GetSysColor
DrawEdge
LoadCursorA
SetWindowsHookExW
CopyRect
EnumWindows
advapi32
RegCreateKeyExW
EqualSid
RegEnumKeyW
RegEnumKeyExW
RevertToSelf
GetLengthSid
InitializeSecurityDescriptor
Sections
.text Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 346KB - Virtual size: 346KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 364KB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ