Static task
static1
Behavioral task
behavioral1
Sample
83b0321143d6fe407a14d8b491120671_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
83b0321143d6fe407a14d8b491120671_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
83b0321143d6fe407a14d8b491120671_JaffaCakes118
-
Size
858KB
-
MD5
83b0321143d6fe407a14d8b491120671
-
SHA1
809f6c6830d439d5978334bb3f320e17c82e6839
-
SHA256
5e48523861ed7b0a971f055f1a45077443bd0ad74225e8bf37050843c5d24b1a
-
SHA512
bdc0b5546bff70d4b1e1ca48e8071c3f85381144535f85cd115ddeb80de91122372ffd74852997b61c3bb14b6da4df62e09d4fdf6bf42b506bd44960545a9511
-
SSDEEP
24576:2FWWsF1Z4p3AEeVfKFG6Q3zw5PYSxG/0cE3:bWQWAjK1pPYSxCW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 83b0321143d6fe407a14d8b491120671_JaffaCakes118
Files
-
83b0321143d6fe407a14d8b491120671_JaffaCakes118.exe windows:4 windows x86 arch:x86
9ecc1083dbb320bf48dad2db540962ed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
sendto
accept
WSAAsyncGetServByPort
WSASendDisconnect
version
GetFileVersionInfoSizeA
VerInstallFileA
VerFindFileA
kernel32
EnumResourceNamesW
GetCommConfig
GetShortPathNameA
SwitchToFiber
SetupComm
TlsGetValue
OutputDebugStringA
SetCurrentDirectoryA
ReadDirectoryChangesW
ExitProcess
GetDateFormatA
LoadLibraryExA
LoadLibraryExW
GetCurrentProcessId
GetLongPathNameA
FreeEnvironmentStringsA
Beep
OpenMutexA
GetCompressedFileSizeW
SetEnvironmentVariableA
WriteProcessMemory
FormatMessageW
GetTickCount
GetNumberFormatW
EndUpdateResourceA
GetLogicalDriveStringsA
GlobalFindAtomW
GetCommModemStatus
WritePrivateProfileStructA
IsBadReadPtr
FindFirstFileW
CancelIo
GetStartupInfoA
OpenFile
GetOEMCP
LCMapStringA
FlushConsoleInputBuffer
GlobalAddAtomW
GetSystemInfo
SetConsoleActiveScreenBuffer
GetComputerNameW
GetTapeStatus
GetShortPathNameW
QueryDosDeviceA
_hread
SearchPathW
PeekConsoleInputW
GetProfileStringA
SetCommMask
CopyFileExW
GetSystemDirectoryW
SetThreadAffinityMask
lstrcpyA
VirtualLock
EnumResourceLanguagesW
CreateIoCompletionPort
ExpandEnvironmentStringsW
user32
SetWindowPlacement
MessageBoxIndirectW
SetWindowsHookExA
GetMenuStringW
InsertMenuItemA
TrackMouseEvent
LoadMenuIndirectA
GetProcessWindowStation
IsIconic
WinHelpA
SetLastErrorEx
IsDlgButtonChecked
GetUserObjectInformationW
RegisterHotKey
UnhookWinEvent
GetNextDlgTabItem
CreateDialogIndirectParamW
EnumClipboardFormats
CheckDlgButton
shell32
SHGetSpecialFolderPathA
SHLoadInProc
SHFileOperationW
SHBrowseForFolderA
oleaut32
QueryPathOfRegTypeLi
SysAllocStringLen
SafeArrayGetElement
SafeArrayRedim
VariantChangeType
LoadTypeLibEx
msvcrt
setlocale
isalnum
_get_osfhandle
_mbsnicmp
_lseek
_splitpath
towupper
_sopen
_exit
_snprintf
_wctime
strspn
wcstol
_mbscpy
_wfsopen
_errno
strcoll
Sections
.text Size: 24KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 603KB - Virtual size: 602KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ