Static task
static1
Behavioral task
behavioral1
Sample
82a89efb86664f714067b4d88fe01347_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
82a89efb86664f714067b4d88fe01347_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
82a89efb86664f714067b4d88fe01347_JaffaCakes118
-
Size
1.2MB
-
MD5
82a89efb86664f714067b4d88fe01347
-
SHA1
d5439d1b6429f5b0bfeb2053976e9dada52ee50f
-
SHA256
c3f60107a28aa5cbd27c028cf47a928715b356302c06601c2d4b90e344a7c6ec
-
SHA512
fb3f06123406a283eb881f04767b8ae8ff859dca087ffd3737b298105a67ef664ff2400a9af306db20140b97ed59b5c4490f24dc26aff952af337953301d8059
-
SSDEEP
24576:yNlYc3sLAPKmZ83vomYbxt2HPD7q/L2W3Ji8uNCjcpseudo+FSYKU/XOHk:HAKY8/oFbTZ2KJiXEeudNSYKUPF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 82a89efb86664f714067b4d88fe01347_JaffaCakes118
Files
-
82a89efb86664f714067b4d88fe01347_JaffaCakes118.exe windows:4 windows x86 arch:x86
e11fac28992d131fda2d4c51b2a5b6b2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
ole32
CoGetObjectContext
CoGetContextToken
CoCreateGuid
MkParseDisplayName
OleCreateStaticFromData
CreateOleAdviseHolder
PropVariantClear
CoUnmarshalInterface
kernel32
GetCurrentProcess
GetACP
SetHandleCount
SizeofResource
lstrcmpiA
CompareStringA
GetStdHandle
GetModuleHandleA
FreeResource
LocalFree
lstrcpynA
GetDateFormatA
GlobalAlloc
GetStartupInfoA
VirtualAllocEx
CloseHandle
GetFileSize
LocalAlloc
GetFileType
GetProcAddress
LocalReAlloc
GetModuleFileNameA
ResetEvent
FindResourceA
GetLocaleInfoA
GlobalFindAtomA
FindFirstFileA
SetThreadLocale
SetLastError
GetDiskFreeSpaceA
LoadLibraryExA
lstrcmpA
GetCurrentThreadId
ExitProcess
LoadLibraryA
InitializeCriticalSection
GetCurrentThread
WriteFile
EnterCriticalSection
SetErrorMode
Sleep
VirtualAlloc
GetProcessHeap
lstrlenA
HeapFree
MoveFileA
RaiseException
GetCommandLineA
WaitForSingleObject
SetEvent
user32
GetWindow
GetParent
GetMenuItemInfoA
IsChild
DefWindowProcA
GetMenuStringA
CharLowerBuffA
GetMessagePos
DrawTextA
SystemParametersInfoA
SetTimer
EnableMenuItem
GetMenuItemID
CreateIcon
BeginDeferWindowPos
GetLastActivePopup
FillRect
GetMenu
DrawEdge
GetActiveWindow
SetWindowTextA
DispatchMessageA
GetDlgItem
GetClientRect
GetScrollInfo
EqualRect
DrawIcon
GetIconInfo
DrawFrameControl
GetScrollPos
EndPaint
SetWindowLongA
DispatchMessageW
IsWindowVisible
EndDeferWindowPos
DrawIconEx
GetSysColor
GetMenuItemCount
GetKeyNameTextA
MessageBoxA
RegisterClassA
IsMenu
SetWindowPos
CharLowerA
GetClipboardData
GetDCEx
GetClassInfoA
DrawMenuBar
CreatePopupMenu
CharNextA
TrackPopupMenu
EnumThreadWindows
CallNextHookEx
DefMDIChildProcA
GetFocus
EnableScrollBar
BeginPaint
GetCapture
GetDC
DefFrameProcA
ClientToScreen
FindWindowA
GetKeyState
GetMenuState
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
version
VerQueryValueA
VerFindFileA
GetFileVersionInfoA
Sections
DATA Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384KB - Virtual size: 384KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 776KB - Virtual size: 775KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CODE Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ