Static task
static1
Behavioral task
behavioral1
Sample
30452f4f214d0d763a38e17f6281573f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
30452f4f214d0d763a38e17f6281573f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
30452f4f214d0d763a38e17f6281573f_JaffaCakes118
-
Size
177KB
-
MD5
30452f4f214d0d763a38e17f6281573f
-
SHA1
848d04f79d5b5005cf3870569c1fac1aee86b973
-
SHA256
a226fbb7f18fd7b3b76d6f74ebbfe9294fa251e59c1a14e03a83363c588a5eca
-
SHA512
3728fa6841630eab4b011aceee195a460a1d0c6388f41cbb12a65f703badcaa8a6cd75939c0e94ef4be8aad6ee06caa920b7ef4fcfd35e9cf3b63084d565fce2
-
SSDEEP
3072:Blx7CeH5k3Wc8FjA2VlNDySXPvXM27qmTdLmy2Wq2qUbCFVRoMcnV7IG5bfH:57CeH5zPVHlHXMV+jafUuRoMcnV7IG5b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30452f4f214d0d763a38e17f6281573f_JaffaCakes118
Files
-
30452f4f214d0d763a38e17f6281573f_JaffaCakes118.exe windows:5 windows x86 arch:x86
2b87e8e7648f9a43983c4e714f38e6a2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
GetProcAddress
DuplicateHandle
CloseHandle
GlobalAlloc
lstrcatW
GetMailslotInfo
CompareFileTime
ExitThread
SetComputerNameExW
SetProcessAffinityMask
GetProcessTimes
GetProcessWorkingSetSize
GetProcessShutdownParameters
lstrlenA
TerminateProcess
AddAtomA
GetLastError
LoadLibraryA
GetTickCount
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
RaiseException
RtlUnwind
GetCommandLineW
HeapSetInformation
GetStartupInfoW
EncodePointer
HeapAlloc
HeapFree
IsProcessorFeaturePresent
DecodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
SetUnhandledExceptionFilter
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
UnhandledExceptionFilter
IsDebuggerPresent
GetCurrentProcess
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
Sleep
HeapSize
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapReAlloc
IsValidLocale
advapi32
LookupPrivilegeNameA
InitiateSystemShutdownW
GetSecurityDescriptorDacl
OpenEventLogW
shell32
ShellExecuteW
ShellAboutW
Sections
.text Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ