msisip.pdb
Static task
static1
Behavioral task
behavioral1
Sample
30547bc3baf8f0c549cf4df2ef498261_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
30547bc3baf8f0c549cf4df2ef498261_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
30547bc3baf8f0c549cf4df2ef498261_JaffaCakes118
-
Size
318KB
-
MD5
30547bc3baf8f0c549cf4df2ef498261
-
SHA1
a5767fd0b5353a3fabef8e1ee6bea99685b6a326
-
SHA256
4285141dc8f7e62f4b70020335a1d5ae4930f6cdf83df80b114bac1f4954e6b0
-
SHA512
cb473a5c9014f73b56182a28ad2ade63526b0736da7995870de582070a5ab88924c7def20b6fc8610f65661dbf83a55a1a9c2ccd38bfdbbdb05eb12818fb8208
-
SSDEEP
6144:4+z8QUX5z4O4b9xb4b3kpFK2gyuqBSWE:bGeLbLw0zKcuqB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30547bc3baf8f0c549cf4df2ef498261_JaffaCakes118
Files
-
30547bc3baf8f0c549cf4df2ef498261_JaffaCakes118.exe windows:5 windows x86 arch:x86
ed88141319f3ee98c5a779feab01f246
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetVersionExW
GetComputerNameW
lstrcpyW
GetModuleHandleA
CopyFileW
GetModuleHandleW
DelayLoadFailureHook
RemoveDirectoryW
lstrcpynW
EnterCriticalSection
DisableThreadLibraryCalls
LoadLibraryA
GetWindowsDirectoryW
SetLastError
LocalFree
SetFileAttributesW
GetFileAttributesW
FreeLibrary
MultiByteToWideChar
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
WritePrivateProfileStringW
ExpandEnvironmentStringsW
WaitForSingleObject
CloseHandle
WriteFile
CreateFileW
GetTempPathW
GetExitCodeProcess
WaitForMultipleObjects
CreateProcessW
FindClose
FindNextFileW
MoveFileW
FindFirstFileW
LoadLibraryExW
GetStartupInfoW
Sleep
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
LeaveCriticalSection
HeapFree
lstrlenW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteFileW
SetFilePointer
WideCharToMultiByte
OutputDebugStringW
HeapAlloc
GetProcessHeap
advapi32
RegSetValueW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegCreateKeyW
RegDeleteKeyW
CloseServiceHandle
GetLengthSid
OpenServiceW
OpenSCManagerW
QueryServiceStatus
PrivilegeCheck
LookupPrivilegeValueW
OpenThreadToken
OpenProcessToken
msvcrt
malloc
_write
_iob
fprintf
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__initenv
_cexit
_XcptFilter
_exit
_c_exit
strrchr
_close
_open
exit
gdi32
GetDeviceCaps
CreateFontIndirectW
DeleteObject
user32
ReleaseDC
GetDC
SetFocus
SetWindowTextW
SetForegroundWindow
SendDlgItemMessageW
GetDlgItemTextW
ScreenToClient
LoadStringW
SetDlgItemInt
FillRect
GetClientRect
GetSysColorBrush
DefWindowProcW
WinHelpW
LoadImageW
LoadCursorW
DispatchMessageW
DialogBoxParamW
MessageBoxW
CreateDialogParamW
GetDesktopWindow
MoveWindow
SetDlgItemTextW
ShowWindow
CharPrevW
CharNextW
IsDlgButtonChecked
GetWindowTextW
SendMessageW
GetDlgItem
EnableWindow
SetCursor
wsprintfW
IsWindow
BringWindowToTop
DestroyWindow
EndDialog
PeekMessageW
FindWindowW
UpdateWindow
GetWindowRect
GetSystemMetrics
SetWindowPos
GetParent
MsgWaitForMultipleObjects
GetWindowLongW
PostMessageW
SetWindowLongW
CheckDlgButton
RegisterWindowMessageW
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 226KB - Virtual size: 235KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ