n:\zeel
Static task
static1
Behavioral task
behavioral1
Sample
82f132fb889963911908e0b7e5da5c83_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
82f132fb889963911908e0b7e5da5c83_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
82f132fb889963911908e0b7e5da5c83_JaffaCakes118
-
Size
616KB
-
MD5
82f132fb889963911908e0b7e5da5c83
-
SHA1
f49169904b1d2879f1aa818d8c3fda5529df8e3c
-
SHA256
79b17b8a7755972e69e5a5c7dc174655c1685c318709b4f01f5d78029db2a179
-
SHA512
e825030894cbfd93ee8181fccfa824a1e4844fc31421d6b2132e611529bbceac8b09cfe3dd6ac9b01a9c31d115adf18b08dbdec4a873f9532ed48e6fc1d60d6d
-
SSDEEP
12288:CeAcm3THlLedjYelv0FttLTzPh+H3RnmTWjmr+veW2iTZXQBx:CeDgTGhlAttLTzPh+X0Emrw2IZABx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 82f132fb889963911908e0b7e5da5c83_JaffaCakes118
Files
-
82f132fb889963911908e0b7e5da5c83_JaffaCakes118.exe windows:4 windows x86 arch:x86
dc1929ca1ddf020eeec906b4d437f8d3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_DrawEx
InitCommonControlsEx
ImageList_Copy
ImageList_Read
ImageList_GetImageRect
user32
ShowWindow
OemToCharW
GetMenuStringA
EndMenu
ChangeDisplaySettingsExA
DdeInitializeA
DdeQueryConvInfo
IsClipboardFormatAvailable
DispatchMessageA
SetThreadDesktop
DlgDirSelectExA
CreateAcceleratorTableA
GetCaretPos
GetMenuItemRect
LoadMenuA
SetLastErrorEx
SendDlgItemMessageW
TranslateAcceleratorA
ReleaseDC
LoadMenuW
OemToCharBuffW
RegisterClassA
UnregisterClassW
PostThreadMessageW
SetDlgItemInt
EnumDesktopsW
OpenInputDesktop
CallMsgFilterA
EndDeferWindowPos
GetMenuStringW
MonitorFromPoint
SetPropW
GetAltTabInfo
SetRect
GetMenuState
WindowFromDC
ChangeMenuW
EnableMenuItem
EnumWindows
OpenClipboard
EnumWindowStationsW
PostThreadMessageA
GetKeyState
SetParent
CheckMenuItem
RegisterClassExA
SetCapture
GetMenuItemInfoA
GetWindowTextW
DrawCaption
RemoveMenu
OemKeyScan
ChangeMenuA
EnumDisplaySettingsA
UnpackDDElParam
GetUserObjectInformationW
MessageBoxW
MapVirtualKeyW
LoadCursorW
ModifyMenuA
GetProcessDefaultLayout
AttachThreadInput
EnumPropsExA
DdeInitializeW
GetMenuContextHelpId
GetWindowModuleFileNameA
GetMonitorInfoW
IsDialogMessageW
DestroyCaret
SendMessageW
SendMessageA
CloseClipboard
ExcludeUpdateRgn
CreateIconIndirect
RegisterClassW
GetShellWindow
DdeQueryNextServer
GetUserObjectSecurity
WINNLSEnableIME
UnhookWindowsHookEx
CallNextHookEx
ChildWindowFromPoint
GetClassWord
CharToOemA
ScrollDC
SetClassLongA
GetDialogBaseUnits
WinHelpA
AnyPopup
GetClassLongA
GetScrollInfo
SetWinEventHook
GetListBoxInfo
SetDlgItemTextW
GetMenuBarInfo
CreateMDIWindowW
GetGuiResources
RegisterDeviceNotificationW
kernel32
EnumResourceNamesW
SetStdHandle
GlobalAddAtomA
LockResource
ReadFile
ExpandEnvironmentStringsA
IsDebuggerPresent
RtlUnwind
GetPrivateProfileIntW
SetEnvironmentVariableA
InterlockedDecrement
GetFileAttributesW
VirtualFree
GetCurrentThread
ExitProcess
VirtualAlloc
CreateProcessA
SetSystemTime
TlsGetValue
GetNamedPipeHandleStateA
WaitForSingleObject
GetVersionExA
GetProcAddress
HeapSize
FindNextChangeNotification
TerminateThread
GetStringTypeW
GetProfileIntW
HeapCreate
GetCurrentThreadId
GetFileAttributesExW
DeleteCriticalSection
GetDateFormatW
GetCalendarInfoA
MapViewOfFile
FreeEnvironmentStringsA
GetTickCount
LCMapStringW
CreateThread
GetLocaleInfoW
CreateMutexA
GetCompressedFileSizeA
SetHandleCount
CreateNamedPipeA
GetProfileSectionW
SetFileTime
TlsFree
CloseHandle
GetCurrentProcess
SetConsoleCP
GetStdHandle
GetModuleHandleA
MoveFileExW
GetStartupInfoA
IsBadWritePtr
GetCommandLineA
SetThreadLocale
GetWindowsDirectoryA
GetSystemDirectoryW
TlsAlloc
QueryPerformanceCounter
WriteConsoleInputA
SetConsoleCursorInfo
LocalHandle
ResetEvent
CompareStringW
SetLastError
FreeEnvironmentStringsW
GetTimeZoneInformation
CreateEventA
GetFileType
GetStringTypeA
GlobalFix
GetLocaleInfoA
LeaveCriticalSection
FreeLibrary
HeapReAlloc
SetFilePointer
HeapAlloc
MultiByteToWideChar
VirtualProtect
GetCurrentProcessId
GetUserDefaultLCID
WaitForSingleObjectEx
EnumSystemLocalesA
GetModuleFileNameA
HeapDestroy
lstrlenW
lstrcatA
VirtualLock
GetSystemTimeAsFileTime
GetCPInfo
GetTimeFormatA
CreateEventW
IsValidLocale
GetEnvironmentStrings
LockFileEx
UnhandledExceptionFilter
LoadLibraryA
ReadConsoleOutputA
OpenMutexA
GetLocalTime
lstrcmpA
TlsSetValue
TerminateProcess
GetProfileStringW
EnumTimeFormatsW
CompareStringA
GetDateFormatA
GetOEMCP
GetEnvironmentStringsW
GetSystemInfo
GetLastError
GetACP
InterlockedExchange
GlobalCompact
SetWaitableTimer
OpenFileMappingA
VirtualQuery
GetExitCodeProcess
WaitForDebugEvent
IsValidCodePage
HeapFree
WideCharToMultiByte
LCMapStringA
InitializeCriticalSection
WriteFile
OpenWaitableTimerA
EnterCriticalSection
FlushFileBuffers
GetShortPathNameA
Sections
.text Size: 208KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 258KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ