Static task
static1
Behavioral task
behavioral1
Sample
83b0353871e30b209d66a0edafd52867_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
83b0353871e30b209d66a0edafd52867_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
83b0353871e30b209d66a0edafd52867_JaffaCakes118
-
Size
284KB
-
MD5
83b0353871e30b209d66a0edafd52867
-
SHA1
87b2e08b5a56802fac366229387e79150b1763b9
-
SHA256
158762894146c70e9fac3b55e73677ef962a7110bf219bd73139c97b3299b33b
-
SHA512
08013493adaba88dbb40f7d9fab09ddaa32a430aaedc5d42571aef83f32d76724d6b5389fdad2f4c92235b3395c4d82dccc1480137f27f0a85db96398dfba189
-
SSDEEP
6144:QD4vGmXQohCki0vEQHAzfwGVpqK+52POsQehPIhr:3vGmsb0vEQgzfTqKQeOSPM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 83b0353871e30b209d66a0edafd52867_JaffaCakes118
Files
-
83b0353871e30b209d66a0edafd52867_JaffaCakes118.exe windows:4 windows x86 arch:x86
7eab8a668bbd4d7646ac68ecff0e7f27
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
VirtualProtect
FindFirstFileW
GetModuleHandleA
SetUnhandledExceptionFilter
WritePrivateProfileSectionW
DosDateTimeToFileTime
GetSystemTime
FreeLibraryAndExitThread
GetStringTypeA
OpenFile
QueryDosDeviceA
EscapeCommFunction
WriteProfileStringA
_lwrite
FindFirstFileA
CopyFileExW
SetThreadExecutionState
SetConsoleCtrlHandler
GetProfileIntA
WriteConsoleOutputAttribute
GetTapeParameters
IsBadStringPtrA
IsBadWritePtr
ConvertDefaultLocale
MoveFileA
PrepareTape
CompareFileTime
CreateWaitableTimerW
OpenMutexW
GetPrivateProfileIntA
GetLastError
GetDateFormatW
LockFile
GetTempPathW
GetThreadSelectorEntry
CreateFileMappingA
RemoveDirectoryA
WriteConsoleInputW
GetLargestConsoleWindowSize
SearchPathA
MapViewOfFileEx
VirtualFree
GetConsoleOutputCP
FindAtomA
CreateDirectoryA
EnumResourceNamesW
CompareStringW
EraseTape
WritePrivateProfileSectionA
GetStartupInfoA
user32
BroadcastSystemMessageA
GetWindowLongA
ToAscii
EnumDisplaySettingsExW
InvalidateRgn
DestroyWindow
CharToOemA
IsCharAlphaA
OpenWindowStationW
TrackPopupMenu
SetWindowsHookExW
ActivateKeyboardLayout
LoadImageW
GetScrollPos
OemKeyScan
IsZoomed
CopyImage
DrawIcon
UnregisterClassA
DefMDIChildProcW
WindowFromDC
CallWindowProcA
gdi32
GetPaletteEntries
EqualRgn
CreateMetaFileA
GetBitmapBits
ExtTextOutA
GetCurrentObject
GetTextCharsetInfo
SetBitmapBits
GetClipRgn
GetWindowExtEx
CreateICW
GetMapMode
SetMapMode
EnumEnhMetaFile
Polygon
GdiFlush
CopyMetaFileW
PlayMetaFile
ModifyWorldTransform
comdlg32
FindTextA
GetFileTitleA
PageSetupDlgA
PrintDlgW
advapi32
SetSecurityDescriptorGroup
LogonUserA
RegGetKeySecurity
EnumDependentServicesA
CryptCreateHash
RegCreateKeyA
LookupPrivilegeValueA
LookupAccountNameA
BuildTrusteeWithSidW
SetKernelObjectSecurity
OpenEventLogW
MakeSelfRelativeSD
ObjectCloseAuditAlarmA
AddAccessDeniedAce
IsTextUnicode
InitializeSid
GetSidLengthRequired
AllocateLocallyUniqueId
QueryServiceStatus
SetSecurityDescriptorOwner
GetUserNameA
shell32
ExtractAssociatedIconW
SHAppBarMessage
ExtractIconW
SHFileOperationA
ExtractIconA
ole32
CoRegisterMessageFilter
BindMoniker
CoSwitchCallContext
CoMarshalInterThreadInterfaceInStream
oleaut32
LoadTypeLi
SafeArrayGetElement
DispGetIDsOfNames
VariantChangeType
GetActiveObject
SysAllocString
comctl32
CreateToolbarEx
PropertySheetA
ImageList_SetBkColor
ImageList_AddMasked
shlwapi
StrStrW
PathIsRelativeW
setupapi
SetupOpenAppendInfFileW
SetupDiDeleteDeviceInfo
SetupDiGetDeviceInstanceIdA
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
Sections
.text Size: 264KB - Virtual size: 263KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE