ewklhojwkl\\ehw\\[email protected]
Static task
static1
Behavioral task
behavioral1
Sample
30bcb86c12aca454d34d8b10c9351c97_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
30bcb86c12aca454d34d8b10c9351c97_JaffaCakes118
-
Size
450KB
-
MD5
30bcb86c12aca454d34d8b10c9351c97
-
SHA1
53110a964f62872b50618d588b900d44c0f270e1
-
SHA256
43599409270fcf6acec3a861e1d6a2c38499d1384bdcaeb07fb521ec11c42aa8
-
SHA512
110597d3cb34bc7a33b2bac27c991f15f2bba86da638907c1c12d7eca651f4bcb9066ab1ef642fd088731b04cabf7f0b6e56a2d8fe87c14426201f527b6b38c8
-
SSDEEP
3072:dv5v7chhAlh4/qmRAvB9sSaYuM5vKIU03qNZ5MDJail93OCVGIBO1AaGsUa+rU2x:gNEDfU4tBO1tvX0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30bcb86c12aca454d34d8b10c9351c97_JaffaCakes118
Files
-
30bcb86c12aca454d34d8b10c9351c97_JaffaCakes118.exe windows:5 windows x86 arch:x86
d8fface45f0fbb37ca050d786e0b4ad7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_SYSTEM
PDB Paths
Imports
advapi32
QueryUsersOnEncryptedFile
RegFlushKey
SetThreadToken
MakeSelfRelativeSD
ntdll
RtlInitializeSListHead
rasapi32
RasFreeEapUserIdentityW
powrprof
IsPwrHibernateAllowed
winscard
SCardListReadersW
msvfw32
DrawDibChangePalette
wininet
InternetSetStatusCallbackW
shlwapi
ChrCmpIA
gdi32
ExtSelectClipRgn
GetMapMode
RoundRect
CopyMetaFileW
ole32
HWND_UserSize
CoTaskMemAlloc
HGLOBAL_UserMarshal
lz32
LZSeek
LZInit
kernel32
TlsGetValue
FindFirstFileNameW
NotifyUILanguageChange
GetConsoleCP
GetFileSizeEx
FormatMessageW
GetLogicalDrives
PurgeComm
GetConsoleScreenBufferInfo
SetErrorMode
lstrcatA
GetCPInfo
GetConsoleMode
UnhandledExceptionFilter
GetProcessIdOfThread
GetModuleHandleW
setupapi
SetupInitDefaultQueueCallback
CM_Set_DevNode_Registry_PropertyW
user32
SetWinEventHook
CreateWindowExW
SendDlgItemMessageW
GetKeyboardLayout
TranslateMessage
GetKeyboardType
ShutdownBlockReasonCreate
GetUpdatedClipboardFormats
CreateIconFromResource
UpdateWindow
GetWindowPlacement
MessageBeep
GetDlgCtrlID
LoadAcceleratorsW
OpenClipboard
LoadCursorW
GetDlgItem
SetWindowTextW
RegisterWindowMessageW
GetSystemMenu
WinHelpW
SetWindowPlacement
PostQuitMessage
GetMenu
GetMenuState
CheckMenuItem
PeekMessageW
CallWindowProcA
DrawTextExW
IsClipboardFormatAvailable
DispatchMessageW
IsDialogMessageW
GetSystemMetrics
GetWindowTextLengthW
TranslateAcceleratorW
CharNextW
ScreenToClient
DestroyWindow
CloseClipboard
GetFocus
GetParent
CharUpperW
CreateDialogParamW
ShowWindow
SetWindowPos
GetWindowLongW
ChildWindowFromPoint
GetDlgItemTextW
GetForegroundWindow
GetCursorPos
MoveWindow
MessageBoxW
ShowOwnedPopups
LoadStringW
GetDC
LoadIconW
SetForegroundWindow
FindWindowW
ReleaseDC
SetDlgItemTextW
EndDialog
SetScrollPos
LoadImageW
SetFocus
InvalidateRect
GetClientRect
SendMessageW
GetWindowTextW
DefWindowProcW
DialogBoxParamW
UnhookWinEvent
GetAncestor
PostMessageW
RegisterClassExW
SetWindowLongW
SetActiveWindow
SetCursor
IsIconic
GetSubMenu
EnableWindow
GetMessageW
EnableMenuItem
netapi32
NetServerTransportAddEx
crypt32
CryptVerifyDetachedMessageSignature
Sections
.text Size: 137KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.PDn. Size: 6KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.rdata0 Size: 301KB - Virtual size: 300KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ