Static task
static1
Behavioral task
behavioral1
Sample
82d683ddcfd405c385903d3a4b58fb76_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
82d683ddcfd405c385903d3a4b58fb76_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
82d683ddcfd405c385903d3a4b58fb76_JaffaCakes118
-
Size
532KB
-
MD5
82d683ddcfd405c385903d3a4b58fb76
-
SHA1
330a402f257fa11b6c5df840fb31be4a12fc65ba
-
SHA256
85de2f25d9b6ef81ea649247e6b2d5ee2ea497fa0ee961e0b52b8e6fa2920f37
-
SHA512
7ee64b43d22c39cb73cbe05d06f9c8ffbd08ce054ccd5137d83a19e0938e92c28d76b817d5a8d50516545c65fd60664f48504c50215c0fbf7af695be781c33bd
-
SSDEEP
12288:kxrQIlzcCcsy9zvvCYCevsw+WJ/7vQxGgOzWNG:Krla6cvsWJGHk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 82d683ddcfd405c385903d3a4b58fb76_JaffaCakes118
Files
-
82d683ddcfd405c385903d3a4b58fb76_JaffaCakes118.exe windows:4 windows x86 arch:x86
26114923db2033de77d2f79a7e6d378d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlUnwind
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetFileAttributesA
SetErrorMode
GetCurrentProcess
FlushFileBuffers
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GlobalFlags
DeleteCriticalSection
InitializeCriticalSection
RaiseException
InterlockedDecrement
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
GlobalAlloc
FormatMessageA
LocalFree
MulDiv
GetModuleFileNameA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
lstrcpynA
GetModuleHandleA
GlobalLock
GlobalUnlock
GlobalFree
GetWindowsDirectoryA
SetFileTime
LocalFileTimeToFileTime
GetCurrentDirectoryA
SystemTimeToFileTime
ReadFile
SetFilePointer
WinExec
CreateFileA
WriteFile
FreeResource
GetLastError
lstrlenA
lstrcmpiA
GetVersion
MultiByteToWideChar
CreateDirectoryA
HeapAlloc
SetLastError
HeapFree
OpenProcess
WaitForSingleObject
TerminateProcess
CloseHandle
FreeLibrary
LoadLibraryA
GetProcAddress
WideCharToMultiByte
LoadResource
GetVersionExA
LockResource
SizeofResource
FindResourceA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
SetHandleCount
user32
ShowWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
CheckRadioButton
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
LoadIconA
PeekMessageA
MapWindowPoints
MessageBoxA
GetKeyState
SetForegroundWindow
IsWindowVisible
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
CopyRect
GetWindow
GetDesktopWindow
GetActiveWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
GetParent
KillTimer
SetTimer
RedrawWindow
ReleaseDC
SendMessageA
EnableWindow
EnumWindows
PostMessageA
GetWindowThreadProcessId
GetWindowRect
UpdateWindow
InvalidateRect
GetDC
ScreenToClient
GetClientRect
InflateRect
PtInRect
LoadCursorA
CopyIcon
IsWindow
GetSysColor
SetCursor
GetMessagePos
MessageBeep
SetWindowLongA
DestroyCursor
DestroyMenu
GetSysColorBrush
WindowFromPoint
PostQuitMessage
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
wsprintfA
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
gdi32
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetDeviceCaps
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetTextExtentPoint32A
GetObjectA
CreateFontIndirectA
GetStockObject
CreateFontA
CreateSolidBrush
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueA
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegDeleteKeyA
RegEnumKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
ShellExecuteA
SHBrowseForFolderA
shlwapi
PathFindFileNameA
PathFindExtensionA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
VariantInit
VariantChangeType
VariantClear
comctl32
ord17
Sections
.text Size: 160KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 316KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ