Static task
static1
Behavioral task
behavioral1
Sample
83f2e6aa9f7232633526bbb11213d825_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
83f2e6aa9f7232633526bbb11213d825_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
83f2e6aa9f7232633526bbb11213d825_JaffaCakes118
-
Size
4.0MB
-
MD5
83f2e6aa9f7232633526bbb11213d825
-
SHA1
97d798e11e7277eb1278cb1bb920da7e0370545e
-
SHA256
48a67204b54384a0cec8ff726843ebaa48d7ce165aeb301fcb10edba935283db
-
SHA512
f0dceeb0890a973358657682be657e75ac4bebff1b312216a8f59553d7dad2effc15ef025f3e46e4681759af5175827cbc8f9176a4fbb06539ea9a1684e0bd93
-
SSDEEP
98304:T7qCPfgy0AjTjcVTN03EQhk5PeklFJRHipftazCDNvr/aneOO:T2CPIyZjTW084iJR6amD/wK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 83f2e6aa9f7232633526bbb11213d825_JaffaCakes118
Files
-
83f2e6aa9f7232633526bbb11213d825_JaffaCakes118.exe windows:5 windows x86 arch:x86
ff0ae17e725034793c12c38dd4124bf3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentConsoleFont
SetTimeZoneInformation
OpenFileMappingA
DuplicateHandle
VirtualAllocEx
GlobalDeleteAtom
DefineDosDeviceA
EndUpdateResourceA
FreeEnvironmentStringsA
MapUserPhysicalPagesScatter
GetStdHandle
EnumSystemLocalesA
MapViewOfFile
GetCurrentProcess
OpenProcess
GetComputerNameExA
GetEnvironmentStringsA
QueryInformationJobObject
GetTickCount
GetDiskFreeSpaceA
GlobalDeleteAtom
WaitForMultipleObjectsEx
Toolhelp32ReadProcessMemory
PurgeComm
SetConsoleMode
VirtualAllocEx
WritePrivateProfileStringA
GetProcessHeap
GetProcessHandleCount
EnumResourceNamesA
MultiByteToWideChar
SetThreadUILanguage
VerifyVersionInfoA
HeapFree
SetFileTime
GetCurrentDirectoryA
GetCPInfoExA
OpenMutexA
FormatMessageA
SetCalendarInfoA
CreateWaitableTimerA
FlushConsoleInputBuffer
GetThreadTimes
SetConsoleCursorPosition
OpenWaitableTimerA
IsBadStringPtrA
CreateTimerQueue
GetMailslotInfo
AddConsoleAliasA
LoadLibraryExA
WriteConsoleOutputAttribute
SetVolumeMountPointA
GetLastError
GetCPInfoExA
GetFileAttributesExA
PurgeComm
SetConsoleKeyShortcuts
GetVolumePathNameA
FillConsoleOutputCharacterA
GetConsoleAliasA
SetLocaleInfoA
GetConsoleAliasesLengthA
HeapCreate
LoadResource
GetCurrencyFormatA
IsBadStringPtrA
SetFirmwareEnvironmentVariableA
GetProcessTimes
FindFirstVolumeMountPointA
FlushFileBuffers
GetCommTimeouts
CreateThread
user32
GetActiveWindow
IsZoomed
ExitWindowsEx
LoadCursorFromFileW
PrintWindow
CharUpperBuffW
CalcMenuBar
OemToCharBuffA
ClipCursor
CharPrevExA
GetMenuStringA
GetNextDlgTabItem
IsCharAlphaNumericA
InternalGetWindowText
UnhookWinEvent
SendDlgItemMessageA
GetMessageA
EnumPropsExW
IsWindow
SetWindowTextA
ChangeClipboardChain
SetDlgItemTextA
MapVirtualKeyA
GetClassLongA
SetClipboardData
UpdatePerUserSystemParameters
EmptyClipboard
SetLayeredWindowAttributes
ReleaseCapture
GetShellWindow
BringWindowToTop
GetMenuDefaultItem
GetMenuStringA
SetPropA
GetWindowTextA
EmptyClipboard
version
VerQueryValueW
comdlg32
GetFileTitleA
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ