Static task
static1
Behavioral task
behavioral1
Sample
30803f54a043d17f8e6577fae4748893_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
30803f54a043d17f8e6577fae4748893_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
30803f54a043d17f8e6577fae4748893_JaffaCakes118
-
Size
12KB
-
MD5
30803f54a043d17f8e6577fae4748893
-
SHA1
776a92259e71139b27c85dd4874dbf667beed416
-
SHA256
11da1b10eabf6f39a5c169fb485075647c5ca313a501f193b7c4eb8fa063af6b
-
SHA512
e981ce47904ad39276b9657ce79434caced4ee0f7c1642c41b3e69d35f3fa97aa5e35710c5a57e939aa8f337a7dd62732c1cc075705546c645ca817752bd42e4
-
SSDEEP
192:LOW5qVfApc1xDBKUOTCcTMGSbZ4q2Ky+CZPrY68Xlb5SMQW1WcQeJ1qqy4wG5Ror:dq+C4MyKyjVbXWrwG5Rowv2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30803f54a043d17f8e6577fae4748893_JaffaCakes118
Files
-
30803f54a043d17f8e6577fae4748893_JaffaCakes118.exe windows:4 windows x86 arch:x86
c821626472a41ba8adc6075bd947347d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
LoadLibraryA
FreeLibrary
DeleteFileA
lstrcpyA
lstrcatA
GetCurrentProcess
GetFileAttributesA
GetProcAddress
CloseHandle
GetModuleHandleW
VirtualQuery
ExitProcess
GetModuleHandleA
GetCommandLineA
HeapAlloc
HeapFree
GetProcessHeap
WriteFile
OpenProcess
CreateFileA
GetTempPathA
TerminateProcess
Process32First
CompareStringA
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
user32
CharToOemA
wsprintfA
MessageBoxA
ExitWindowsEx
ShowWindow
ReleaseDC
advapi32
RegOpenKeyExA
RegEnumKeyA
RegDeleteKeyA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
shell32
ShellExecuteA
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE