Static task
static1
Behavioral task
behavioral1
Sample
30e3bb33aa4d6033f8bfa1815f5e17bd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
30e3bb33aa4d6033f8bfa1815f5e17bd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
30e3bb33aa4d6033f8bfa1815f5e17bd_JaffaCakes118
-
Size
478KB
-
MD5
30e3bb33aa4d6033f8bfa1815f5e17bd
-
SHA1
a4b9891351e2b512810fc36d246a6a600b50baac
-
SHA256
451caef359760ff944180d73d88018af068e32ebad3fc4a7ce7d3943b4fff23e
-
SHA512
3be595483bd012c2d174b8f6ba7df0cddb73fca1173af57fc56aa00f67c7239d7e001be2f29900c46416f837eb56b22775e253ccd8bfc9a13b12c2551cc73bda
-
SSDEEP
12288:myfCLkq1MFP91pWOQSCD7cb/0vHjkLJRLmO1:m1kpFP1WvSCDoEQLvyO1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30e3bb33aa4d6033f8bfa1815f5e17bd_JaffaCakes118
Files
-
30e3bb33aa4d6033f8bfa1815f5e17bd_JaffaCakes118.exe windows:4 windows x86 arch:x86
a007b89d5ba1b6b8a0647bff9675e22c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetTempPathA
ReadFile
lstrcmpA
lstrcmpiA
lstrcpynA
GetProcAddress
LoadLibraryA
GetFileSize
lstrlenA
lstrcatA
FormatMessageA
GetLastError
LockResource
SizeofResource
LoadResource
FindResourceA
RemoveDirectoryA
GetModuleFileNameA
GetModuleHandleA
DeleteFileA
CreateDirectoryA
WriteFile
CreateFileA
LocalAlloc
lstrcpyA
FreeLibrary
SetFilePointer
LocalFree
GetVersion
ExitProcess
FlushFileBuffers
GetOEMCP
SetStdHandle
GetStringTypeW
GetStringTypeA
GetACP
IsBadCodePtr
IsBadReadPtr
GetCPInfo
IsBadWritePtr
HeapReAlloc
SetUnhandledExceptionFilter
VirtualFree
HeapCreate
VirtualAlloc
GetFileType
GetStdHandle
HeapDestroy
GetEnvironmentStringsW
GetEnvironmentStrings
SetHandleCount
FreeEnvironmentStringsA
CloseHandle
FreeEnvironmentStringsW
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
RtlUnwind
ResumeThread
CreateThread
TlsSetValue
ExitThread
InterlockedDecrement
InterlockedIncrement
GetStartupInfoA
GetCommandLineA
UnhandledExceptionFilter
InitializeCriticalSection
HeapFree
HeapAlloc
TlsAlloc
SetLastError
TlsGetValue
TerminateProcess
GetCurrentProcess
user32
wsprintfA
CreateWindowExA
InvalidateRect
SetWindowLongA
PostMessageA
IsWindow
GetMessageA
DispatchMessageA
TranslateMessage
FillRect
GetWindowLongA
EndPaint
DrawTextA
BeginPaint
DestroyWindow
PostQuitMessage
SetForegroundWindow
GetDesktopWindow
ShowWindow
CloseWindow
DefWindowProcA
SetWindowTextA
DestroyMenu
LoadMenuA
LoadIconA
LoadCursorA
SetCapture
ReleaseCapture
GetCursorPos
TrackPopupMenu
RegisterClassA
GetSubMenu
GetWindowRect
GetCursor
SetCursor
UpdateWindow
GetClientRect
MessageBoxA
PostThreadMessageA
SetWindowPos
SetWindowRgn
gdi32
GetStockObject
ExtCreateRegion
CombineRgn
CreateRectRgn
DeleteObject
SetTextColor
SetBkMode
SelectObject
CreateFontA
CreateSolidBrush
shell32
DragQueryFileA
DragFinish
ShellExecuteA
Sections
.text Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ