Static task
static1
Behavioral task
behavioral1
Sample
83105186db6a3d703e4687623260dff6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
83105186db6a3d703e4687623260dff6_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
83105186db6a3d703e4687623260dff6_JaffaCakes118
-
Size
480KB
-
MD5
83105186db6a3d703e4687623260dff6
-
SHA1
58a99fea8308182b8c0725f758c370b6b096ce4d
-
SHA256
c27e23a7f85d16f6940fdfe449ed2553eeb613542bd651eadb8a5ca50db71bd7
-
SHA512
42c9aab74a78df9b440d2f5b2eee0ce4653ca25ee1591ad7206062c4c7305153d272733fd8cb13069fc41d02c9d8f81cb70c669316b3045bb69c567c6bf6ae36
-
SSDEEP
6144:81tzCkeToZhGp6nwpbCHBc+CW5TWrlxxaItg+Joq8EZqR7Pywr3jgZnDB18:8zreToZQrU5TWh9r82MPX4nb8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 83105186db6a3d703e4687623260dff6_JaffaCakes118
Files
-
83105186db6a3d703e4687623260dff6_JaffaCakes118.exe windows:4 windows x86 arch:x86
4d87deccd29e23757d5f87e89ca7ac03
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
kernel32
HeapFree
CreateThread
RtlUnwind
HeapReAlloc
HeapAlloc
SetCurrentDirectoryA
GetFileType
RaiseException
ExitThread
GetModuleHandleA
GetCommandLineA
GetTimeZoneInformation
GetSystemTime
TerminateProcess
HeapSize
GetCPInfo
GetACP
GetOEMCP
GetStartupInfoA
HeapDestroy
SetUnhandledExceptionFilter
GetFileAttributesA
UnhandledExceptionFilter
LCMapStringA
LCMapStringW
SetStdHandle
SetHandleCount
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetStringTypeA
WritePrivateProfileStringA
GetCurrentDirectoryA
IsBadWritePtr
IsBadCodePtr
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetErrorMode
GlobalGetAtomNameA
GlobalAddAtomA
GetModuleFileNameA
GetFullPathNameA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
GetCurrentProcess
DuplicateHandle
VirtualAlloc
VirtualFree
CreateProcessA
FormatMessageA
LocalFree
GetLastError
WriteFile
GetLocalTime
QueryPerformanceFrequency
GetTickCount
QueryPerformanceCounter
GetDateFormatA
WaitForSingleObject
ResetEvent
SetEvent
GetWindowsDirectoryA
ExpandEnvironmentStringsA
CreateDirectoryA
CreateFileA
MoveFileA
GetFileSize
ReadFile
Sleep
CloseHandle
CreateEventA
GetLocaleInfoA
DeleteFileA
ExitProcess
lstrcpyA
GetVersion
GetProcessVersion
GlobalFlags
lstrcmpiA
MulDiv
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
lstrcpynA
ResumeThread
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetCurrentThread
FileTimeToSystemTime
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GetThreadLocale
GlobalLock
GlobalUnlock
GlobalFree
FindResourceA
LoadResource
LockResource
lstrcatA
GetCurrentThreadId
DeviceIoControl
LoadLibraryA
GetProcAddress
FreeLibrary
GetFileInformationByHandle
FileTimeToLocalFileTime
FileTimeToDosDateTime
GetFileTime
GetDriveTypeA
GetSystemDefaultLCID
GetSystemDirectoryA
GetComputerNameA
lstrlenA
SetLastError
CopyFileA
FindFirstFileA
FindClose
GetStringTypeW
IsBadReadPtr
HeapCreate
user32
ReleaseCapture
WindowFromPoint
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatA
SetRectEmpty
LoadAcceleratorsA
TranslateAcceleratorA
LoadMenuA
SetMenu
ReuseDDElParam
UnpackDDElParam
IsIconic
BringWindowToTop
PostThreadMessageA
GrayStringA
TabbedTextOutA
GetWindowDC
GetSysColorBrush
ClientToScreen
PtInRect
GetClassNameA
MapDialogRect
GetMessageA
ValidateRect
GetCursorPos
ShowOwnedPopups
PostQuitMessage
CharUpperA
CharNextA
OffsetRect
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
EnableMenuItem
MoveWindow
GetNextDlgTabItem
GetActiveWindow
PostMessageA
SystemParametersInfoA
MapWindowPoints
SetActiveWindow
SetFocus
AdjustWindowRectEx
EqualRect
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
ScreenToClient
GetTopWindow
IsWindowEnabled
IsChild
GetCapture
GetClassInfoA
RegisterClassA
GetMenuItemCount
GetMenuItemID
GetKeyState
CopyAcceleratorTableA
SetWindowsHookExA
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
RemovePropA
GetMessageTime
GetMessagePos
GetWindow
RegisterWindowMessageA
CreatePopupMenu
AppendMenuA
IsClipboardFormatAvailable
TrackPopupMenu
DestroyMenu
wsprintfA
CallWindowProcA
GetAsyncKeyState
IsDialogMessageA
IsWindow
CreateDialogParamA
DestroyWindow
MessageBoxA
UpdateWindow
DefWindowProcA
GetWindowTextA
BeginPaint
EndPaint
GetDlgCtrlID
GetWindowLongA
SetWindowLongA
IsWindowVisible
GetDC
ReleaseDC
GetClientRect
GetWindowRect
GetSystemMetrics
SetWindowPos
FillRect
CopyRect
InflateRect
DrawFocusRect
DrawTextA
GetParent
GetScrollPos
SetScrollInfo
SetDlgItemTextA
SetDlgItemInt
CheckDlgButton
GetDlgItemTextA
IsDlgButtonChecked
SetRect
CreateWindowExA
GetFocus
GetWindowTextLengthA
GetSubMenu
SetWindowTextA
EndDialog
TranslateMessage
DispatchMessageA
PeekMessageA
SendMessageA
SendDlgItemMessageA
InvalidateRect
ShowWindow
GetMenu
CheckMenuItem
SetClassLongA
GetDlgItem
GetPropA
SetPropA
GetClassLongA
SetCursor
ChildWindowFromPoint
WinHelpA
GetClassInfoExA
LoadIconA
RegisterClassExA
LoadCursorA
GetSysColor
GetDesktopWindow
DialogBoxParamA
LoadStringA
FindWindowA
EnableWindow
UnhookWindowsHookEx
CallNextHookEx
CreateDialogIndirectParamA
UnregisterClassA
gdi32
GetTextMetricsA
DeleteObject
SetTextColor
SetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SetMapMode
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
ExtTextOutA
Escape
DPtoLP
LPtoDP
GetMapMode
RestoreDC
SaveDC
GetStockObject
GetBkColor
GetTextColor
CreateBitmap
GetObjectA
SetBkColor
SetAbortProc
StartDocA
GetTextExtentPointA
GetDeviceCaps
StartPage
TextOutA
EndPage
EndDoc
AbortDoc
DeleteDC
GetTextFaceA
CreateFontA
SetBkMode
CreatePen
SelectObject
Rectangle
MoveToEx
LineTo
OffsetViewportOrgEx
CreateSolidBrush
comdlg32
GetOpenFileNameA
GetFileTitleA
PrintDlgA
GetSaveFileNameA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
GetUserNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegEnumKeyExA
RegOpenKeyA
RegFlushKey
RegSetValueExA
RegCreateKeyExA
shell32
DragQueryFileA
DragFinish
comctl32
ord2
ord6
ord17
ImageList_Destroy
oledlg
ord8
ole32
CreateILockBytesOnHGlobal
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CoGetClassObject
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
StgCreateDocfile
CoRegisterMessageFilter
OleIsCurrentClipboard
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
OleFlushClipboard
CoRevokeClassObject
CLSIDFromProgID
olepro32
ord253
oleaut32
VariantClear
SysAllocStringLen
SysFreeString
VarBstrFromDate
SysAllocString
VariantChangeType
SysAllocStringByteLen
SysStringLen
wininet
HttpAddRequestHeadersA
InternetReadFile
InternetAttemptConnect
InternetConnectA
InternetErrorDlg
InternetCloseHandle
InternetOpenA
HttpOpenRequestA
HttpSendRequestA
Sections
.text Size: 268KB - Virtual size: 267KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE