Static task
static1
Behavioral task
behavioral1
Sample
83c80076b33cc093bceea746ab0250d2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
83c80076b33cc093bceea746ab0250d2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
83c80076b33cc093bceea746ab0250d2_JaffaCakes118
-
Size
128KB
-
MD5
83c80076b33cc093bceea746ab0250d2
-
SHA1
0f065d2bacf7d8f8f0f5a09b60b432deec9116dd
-
SHA256
4f283b86acdcc4e05e526331e05e25c8679d76b19d5fee0e79a017f1d7a8dd62
-
SHA512
90b0f5e0ecc45887ae4518cf30c2d22d4e53954bcaa7421b2354301fcc864dde1f8e6d0db74c8199260411dcf4888b4626d900121df481be344fbd893abc950c
-
SSDEEP
3072:k4Mjo5dq8M3WSnJi9EUeRKm78QOvamymMK:krjodmWSJAE/0mJmymF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 83c80076b33cc093bceea746ab0250d2_JaffaCakes118
Files
-
83c80076b33cc093bceea746ab0250d2_JaffaCakes118.exe windows:1 windows x86 arch:x86
2769117e90ad85d2a8f9f5e57c3c8510
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_XcptFilter
_acmdln
__setusermatherr
_controlfp
__p__commode
__p__fmode
__set_app_type
_except_handler3
__getmainargs
_initterm
memcpy
exit
_exit
_adjust_fdiv
gdi32
RestoreDC
GetStockObject
SetBkMode
kernel32
VirtualProtect
GetModuleHandleA
GetStartupInfoA
VirtualAlloc
VirtualFree
user32
IsZoomed
GetWindowThreadProcessId
InvalidateRgn
IsDlgButtonChecked
DrawMenuBar
SetClassLongA
LoadAcceleratorsA
wsprintfA
LoadMenuA
GetDoubleClickTime
RegisterWindowMessageA
CreateWindowExA
IntersectRect
FindWindowA
SetClipboardData
LoadCursorA
Sections
.text Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ