Static task
static1
Behavioral task
behavioral1
Sample
d98cf2a51d25de0eca453cb8a635371d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d98cf2a51d25de0eca453cb8a635371d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d98cf2a51d25de0eca453cb8a635371d_JaffaCakes118
-
Size
292KB
-
MD5
d98cf2a51d25de0eca453cb8a635371d
-
SHA1
3c54c25c38b609c86ab280360df6825aacede5e0
-
SHA256
d52e0fde249f1485add185932bda8467d5bfed08607767cc164867fa61bf7a94
-
SHA512
4732425dfb7697ffec553b5d51cdb5a28452eb1a36f4b30c868956660aaa6538eec4d0bd5349ea4f2cbac3a86ad4933ec026cf3aac8aaeb1831508ad8fd5bd28
-
SSDEEP
6144:kY69m6jIbYbCKOGWo0d7S+VpqJEG2IsJ4KkwlkmXgzkq:33UbCew7XV78KM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d98cf2a51d25de0eca453cb8a635371d_JaffaCakes118
Files
-
d98cf2a51d25de0eca453cb8a635371d_JaffaCakes118.exe windows:4 windows x86 arch:x86
fc8fc6bc559e193ac82d60f729fe7fed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetLastError
GetTickCount
GetCurrentProcess
MultiByteToWideChar
GetSystemDirectoryW
GetVersionExA
GetProcessHeap
GetStartupInfoW
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsAlloc
GetCurrentThreadId
HeapCreate
ExitProcess
GetModuleFileNameA
GetEnvironmentStringsW
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
Sleep
GetLocaleInfoA
InitializeCriticalSection
LoadLibraryA
GetVersion
GetProcAddress
user32
GetSystemMetrics
LoadImageA
DefWindowProcW
GetMenuStringW
CreateDialogParamA
SetCursor
GetTopWindow
CheckMenuItem
InsertMenuItemA
GetMenuItemCount
wvsprintfA
FindWindowA
CreateAcceleratorTableA
MonitorFromRect
GetMenuItemInfoW
GetAsyncKeyState
CreateDialogIndirectParamA
SetDlgItemInt
CreateDialogParamW
ActivateKeyboardLayout
IsMenu
LoadCursorW
LoadIconA
GetFocus
CharUpperA
ShowCaret
EndMenu
GetCursorPos
IsWindow
AdjustWindowRect
RegisterWindowMessageA
WinHelpW
RegisterClassExW
SetDlgItemTextA
LoadMenuW
EmptyClipboard
DialogBoxIndirectParamA
GetKeyboardType
GetSysColor
DialogBoxParamW
DefWindowProcA
SendDlgItemMessageA
EnableWindow
GetCaretPos
LoadCursorA
RemoveMenu
GetKeyboardLayout
CharNextA
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
CloseServiceHandle
StartServiceW
OpenServiceW
OpenSCManagerW
polstore
IPSecFreePolStr
IPSecDeleteFilterData
IPSecCreateNFAData
IPSecEnumNFAData
IPSecAssignPolicy
IPSecFreeFilterSpecs
IPSecFreeMulPolicyData
IPSecDeleteISAKMPData
gdi32
CreateColorSpaceA
CreatePen
GetTextExtentPointW
CreateHatchBrush
GetMetaFileW
UpdateICMRegKeyW
SetWinMetaFileBits
ieaksie
DllCanUnloadNow
Sections
.icode Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.mZ Size: 4KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Q Size: 2KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 93KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.elwzyt Size: 4KB - Virtual size: 773KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 302KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 121KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.YcJsJG Size: 1024B - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.IQvJ Size: 1KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tkFvY Size: 2KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ