_rWjKiO
Static task
static1
Behavioral task
behavioral1
Sample
83f24e3a79c5c4e3fcce188ff34ecfcd_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
83f24e3a79c5c4e3fcce188ff34ecfcd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
83f24e3a79c5c4e3fcce188ff34ecfcd_JaffaCakes118
-
Size
98KB
-
MD5
83f24e3a79c5c4e3fcce188ff34ecfcd
-
SHA1
b991bdc7dd46de313888b140e02970c83e802d82
-
SHA256
81a0d4392a89011a5d9e0c97566c0a6973912c51018af01990df34c25982a36a
-
SHA512
2b6b843429f6fc060a5263e0ff7c17d5f86153d2f4011cfa00f862603bc41df11219cd52ef0ee98a584f138530ec10309aada096194297d36e7a246acfebb371
-
SSDEEP
1536:g/qKFhy3nBiwgo0CVDezyQeWc3mJr91f443vlyXJ5M4m/:657y3BiwbFaNr9Z/lyXJnC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 83f24e3a79c5c4e3fcce188ff34ecfcd_JaffaCakes118
Files
-
83f24e3a79c5c4e3fcce188ff34ecfcd_JaffaCakes118.exe windows:4 windows x86 arch:x86
8529ebd7acbc30c2007a4ccd9619ab1c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
ShowScrollBar
GetParent
GetClassNameA
CreateMenu
RegisterClipboardFormatA
RemoveMenu
IsWindowEnabled
DrawTextA
LoadBitmapA
IsMenu
DeleteMenu
GetMenu
GetKeyboardType
GetCapture
TranslateMDISysAccel
KillTimer
UnhookWindowsHookEx
IsChild
RegisterWindowMessageA
IsCharUpperA
SetActiveWindow
GetSystemMetrics
SetScrollRange
GetSubMenu
OpenClipboard
ReleaseDC
IsCharLowerA
SetClassLongA
GetMenuItemID
OpenIcon
CharUpperBuffA
IsWindow
IsIconic
InflateRect
GetWindowPlacement
EnumWindows
GetKeyboardState
DefWindowProcA
PeekMessageA
EqualRect
GetMenuState
GetKeyState
SendMessageA
OemToCharA
SetPropA
InvalidateRect
ClientToScreen
GetMenuItemInfoA
GetKeyboardLayoutNameA
SetTimer
EnumChildWindows
SetParent
EnableMenuItem
CharNextW
GetScrollRange
GetActiveWindow
GetClientRect
UnregisterClassA
GetDesktopWindow
DrawEdge
GetTopWindow
DispatchMessageW
msvcrt
clock
swprintf
_acmdln
calloc
wcsncmp
rand
malloc
sprintf
atol
sqrt
wcschr
exit
gdi32
GetDIBColorTable
GetClipBox
kernel32
GetDiskFreeSpaceA
GetOEMCP
LockResource
GetCurrentThreadId
ExitThread
ExitProcess
LoadLibraryA
GetTempPathA
SetLastError
LocalFree
GlobalFindAtomA
GetLastError
GetDateFormatA
EnterCriticalSection
Sleep
SetThreadLocale
VirtualAllocEx
VirtualAlloc
LocalAlloc
GetLocaleInfoA
WideCharToMultiByte
ReadFile
lstrcmpiA
lstrcatA
SizeofResource
Exports
Exports
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fadata Size: 512B - Virtual size: 72B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ