Static task
static1
Behavioral task
behavioral1
Sample
83002de8817a256bd032ab29186bc099_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
83002de8817a256bd032ab29186bc099_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
83002de8817a256bd032ab29186bc099_JaffaCakes118
-
Size
228KB
-
MD5
83002de8817a256bd032ab29186bc099
-
SHA1
0fe7b1432309efe1065b9487c170654f11444641
-
SHA256
487faf926b555ff7ceefffb371850ba319c68fe5e0f8754eefb6f90cc62c2375
-
SHA512
ba451facb7eb2f9f754d8e6fa6a4f416a928db1b86a15fb062f078ce25291487e4a834a9cb4807e8fd517b37d5a85479e4db8b207e8ec96abcc7d64533852d33
-
SSDEEP
3072:pVmN70p6iR5zBgFZ/2KW1d8m3W4hKly6gDcZw0jW51cDYLWv6zx9:pVA0pdLBw2oZZy3cZwC7MWCx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 83002de8817a256bd032ab29186bc099_JaffaCakes118
Files
-
83002de8817a256bd032ab29186bc099_JaffaCakes118.exe windows:4 windows x86 arch:x86
d30fe3a3c6fbdf168192f7bae1d8bec8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4425
ord3597
ord324
ord4234
ord2385
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4465
ord4698
ord5307
ord5289
ord5714
ord4622
ord4424
ord3738
ord561
ord815
ord1146
ord1168
ord4160
ord2863
ord2379
ord755
ord470
ord798
ord533
ord1567
ord268
ord5645
ord5583
ord541
ord801
ord6143
ord4202
ord6453
ord6215
ord1200
ord2086
ord1105
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord5163
ord5241
ord4407
ord1775
ord4078
ord6052
ord2514
ord4710
ord4998
ord4853
ord4376
ord5265
ord663
ord348
ord6394
ord5450
ord6383
ord5440
ord3663
ord5442
ord1576
ord354
ord5186
ord5773
ord6385
ord2393
ord1979
ord665
ord1158
ord922
ord926
ord941
ord641
ord939
ord2764
ord5710
ord356
ord2770
ord1980
ord668
ord5683
ord535
ord540
ord860
ord537
ord800
ord4129
ord858
ord2818
ord823
ord4079
ord825
msvcrt
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p__fmode
exit
_XcptFilter
_setmbcp
_strupr
_itoa
__set_app_type
_iob
_acmdln
_controlfp
__CxxFrameHandler
memmove
strrchr
_purecall
atoi
rand
srand
time
__p___argc
__p___argv
_mbsicmp
strstr
_except_handler3
free
malloc
abort
fprintf
fclose
fread
fopen
realloc
strcmp
fwrite
fflush
_setmode
ftell
fseek
fgets
_exit
_onexit
??1type_info@@UAE@XZ
__dllonexit
kernel32
GetStartupInfoA
GetCurrentThreadId
ResumeThread
SetConsoleCtrlHandler
ResetEvent
OpenProcess
TerminateProcess
CreateProcessA
CreateToolhelp32Snapshot
InitializeCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EnterCriticalSection
GetTickCount
Sleep
OutputDebugStringA
WritePrivateProfileStringA
GetModuleFileNameA
GetLocalTime
GetModuleHandleA
GetLastError
CloseHandle
CreateFileA
WaitForSingleObject
SetEvent
FreeLibrary
GetProcAddress
LoadLibraryA
GetFileSize
SetCurrentDirectoryA
Process32First
Process32Next
user32
LoadMenuA
GetSubMenu
SetForegroundWindow
IsWindowVisible
EnableMenuItem
TrackPopupMenu
DestroyMenu
RegisterWindowMessageA
GetForegroundWindow
CreateDialogParamA
GetWindowLongA
SetWindowLongA
PeekMessageA
TranslateMessage
DispatchMessageA
GetCursorPos
GetDC
FillRect
GetDlgItem
SetWindowPos
ShowWindow
SetTimer
KillTimer
EndDialog
DestroyWindow
IsIconic
GetSystemMetrics
GetClientRect
GetWindowThreadProcessId
FindWindowA
PostMessageA
EnableWindow
LoadIconA
SendMessageA
AppendMenuA
GetSystemMenu
DrawIcon
gdi32
CreateSolidBrush
SetBkColor
SetTextColor
SelectObject
TextOutA
advapi32
OpenProcessToken
CreateProcessAsUserA
shell32
Shell_NotifyIconA
SHGetFileInfoA
ShellExecuteA
wsock32
select
recv
send
setsockopt
recvfrom
sendto
connect
htonl
accept
listen
htons
inet_addr
shutdown
closesocket
bind
socket
ioctlsocket
WSAStartup
gethostname
gethostbyname
iphlpapi
GetAdaptersInfo
msvcp60
??0Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
psapi
GetModuleFileNameExA
Sections
.text Size: 148KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ