Static task
static1
Behavioral task
behavioral1
Sample
30d26c0792dc714a616ac69394be7458_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
30d26c0792dc714a616ac69394be7458_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
30d26c0792dc714a616ac69394be7458_JaffaCakes118
-
Size
196KB
-
MD5
30d26c0792dc714a616ac69394be7458
-
SHA1
6e8da941322a14130e3b0bdb5bc9ada67fc69f02
-
SHA256
91368cac9a93c41a70130e9b9a23a9fe9c9ce871cfa44a2d4931a4c78801de27
-
SHA512
044ac6ea6df0c033b09a7920daa7243834847cb0a9711bd7e78060c05735108134e2a27bf1bc9c96bee059d1aa22875984c2a949433d20bfda9a79699914c034
-
SSDEEP
6144:yh25j7Opu/vY3Kbc0TkR+RrWnDEs2s33vtdL:ygYcY6ItR+IQjy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30d26c0792dc714a616ac69394be7458_JaffaCakes118
Files
-
30d26c0792dc714a616ac69394be7458_JaffaCakes118.exe windows:4 windows x86 arch:x86
cc8854acc0bb83ee3a87647c3319691c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord4853
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5265
ord4998
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord5163
ord6374
ord3749
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord3597
ord1146
ord1168
ord540
ord537
ord324
ord2302
ord4234
ord668
ord1980
ord2642
ord2770
ord5065
ord1727
ord858
ord2818
ord4710
ord2379
ord755
ord470
ord4376
ord1795
ord2575
ord6055
ord1776
ord4396
ord5290
ord3402
ord3574
ord609
ord556
ord567
ord809
ord4275
ord3663
ord3571
ord3626
ord613
ord640
ord2405
ord2414
ord1641
ord1640
ord323
ord289
ord2864
ord561
ord2754
ord2859
ord4284
ord5875
ord3874
ord356
ord860
ord800
ord1134
ord823
ord5861
ord4673
ord818
ord6379
ord6215
ord6172
ord3619
ord3573
ord816
ord562
ord801
ord541
ord535
ord795
ord940
ord6199
ord3797
ord283
ord4204
ord4202
ord711
ord413
ord521
ord6307
ord941
ord1175
ord2463
ord1651
ord1929
ord2725
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord3738
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord2621
ord815
ord2514
ord641
ord825
ord4129
ord3262
ord3081
ord2985
ord3259
ord3136
ord4465
ord5714
ord3147
ord2982
ord4698
ord5289
ord5307
ord6197
ord4079
ord5789
ord2567
ord1576
msvcrt
_setmbcp
__CxxFrameHandler
strrchr
exit
strtok
_mbsicoll
__dllonexit
_onexit
_exit
_XcptFilter
_controlfp
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
kernel32
GetStartupInfoA
CreateFileMappingA
MapViewOfFile
OpenFileMappingA
CloseHandle
GetVersionExA
UnmapViewOfFile
GetModuleHandleA
GetModuleFileNameA
user32
DrawEdge
SetForegroundWindow
SystemParametersInfoA
GetLastActivePopup
CopyRect
FillRect
InflateRect
GetFocus
DestroyIcon
EnableWindow
PostMessageA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
LoadIconA
DrawTextA
GetKeyState
IsWindowVisible
ClientToScreen
RedrawWindow
GetSysColor
DrawFocusRect
GetCursorPos
ScreenToClient
SetCursor
LoadCursorA
PtInRect
SetCapture
ReleaseCapture
InvalidateRect
UpdateWindow
LoadImageA
SetRectEmpty
OffsetRect
IsRectEmpty
DrawStateA
GetParent
GetWindowRect
gdi32
DeleteObject
BitBlt
GetObjectA
CreateCompatibleDC
SelectObject
GetStockObject
GetTextExtentPoint32A
EnumFontFamiliesA
CreatePatternBrush
CreateFontIndirectA
CreateSolidBrush
GetTextMetricsA
GetDeviceCaps
SetBkMode
CreateDIBitmap
DeleteDC
PlgBlt
SetTextColor
CreateCompatibleBitmap
GetCurrentObject
GetTextCharsetInfo
StretchBlt
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
comctl32
_TrackMouseEvent
Sections
.text Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 156KB - Virtual size: 184KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE