Static task
static1
Behavioral task
behavioral1
Sample
30e477e4ae08958b2e0aa679a457791c_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
30e477e4ae08958b2e0aa679a457791c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
30e477e4ae08958b2e0aa679a457791c_JaffaCakes118
-
Size
256KB
-
MD5
30e477e4ae08958b2e0aa679a457791c
-
SHA1
bba993762ca3f81c0e4c263d8447081e6e02e91d
-
SHA256
791ec14d8e902e1c4ba1792ba5702f6c50dfabfa3810a2dcdf3ff84f033e8510
-
SHA512
5dab6a7e78c84bce63215207422f26be958da6ddfc844e9113bae8e2d124027e88e349aabe40437c8c802d2b192c0105c8c9d2359019d17dc4c4a61f18467d95
-
SSDEEP
6144:94eCvxuqJ7qRfg/8zgq8D14OB5fPi1qMcCYY:94eCQqpz/8CDpiob
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30e477e4ae08958b2e0aa679a457791c_JaffaCakes118
Files
-
30e477e4ae08958b2e0aa679a457791c_JaffaCakes118.exe windows:4 windows x86 arch:x86
ed1a2c4fab98e3fbd4932094bb18456d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
dxwnd
ord4
ord2
ord1
ord3
shlwapi
PathRemoveFileSpecA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
kernel32
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
ExitProcess
RtlUnwind
RaiseException
HeapReAlloc
TerminateProcess
HeapSize
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
VirtualProtect
GetSystemInfo
VirtualQuery
SetStdHandle
SetEnvironmentVariableA
GetTickCount
SetErrorMode
LocalFileTimeToFileTime
FileTimeToLocalFileTime
GetShortPathNameA
CreateFileA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
MoveFileA
SystemTimeToFileTime
FileTimeToSystemTime
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
GlobalFlags
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedDecrement
GetDiskFreeSpaceA
GetFullPathNameA
GetTempFileNameA
GetFileTime
SetFileTime
GetFileAttributesA
CloseHandle
GetCurrentThread
lstrcmpA
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
GlobalFree
MulDiv
GlobalAlloc
FormatMessageA
LocalFree
GetLastError
SetLastError
FreeResource
GetCurrentThreadId
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcmpW
GetModuleHandleA
GetProcAddress
lstrcatA
lstrcpyA
GlobalLock
lstrcpynA
GlobalUnlock
GlobalGetAtomNameA
GlobalAddAtomA
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteFileA
GetCurrentDirectoryA
WritePrivateProfileStringA
GetPrivateProfileStringA
CreateProcessA
GetPrivateProfileIntA
GetVersion
GetVersionExA
CompareStringA
GetThreadLocale
lstrcmpiA
InterlockedExchange
GetStringTypeExA
MultiByteToWideChar
GetACP
CompareStringW
WideCharToMultiByte
GetLocaleInfoA
lstrlenA
FreeEnvironmentStringsW
user32
RegisterClipboardFormatA
PostThreadMessageA
MessageBeep
GetNextDlgGroupItem
SetCapture
InvalidateRgn
CopyAcceleratorTableA
SetRect
CharNextA
DestroyIcon
IsRectEmpty
EndPaint
BeginPaint
GetWindowDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
LoadCursorA
GetDC
ReleaseDC
GetSysColorBrush
GetMenuItemInfoA
InflateRect
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetWindowContextHelpId
MapDialogRect
ShowOwnedPopups
PostQuitMessage
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
MoveWindow
SetWindowTextA
IsDialogMessageA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
MessageBoxA
TrackPopupMenu
SetForegroundWindow
GetClientRect
AdjustWindowRectEx
ScreenToClient
DeferWindowPos
RegisterClassA
UnregisterClassA
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
GetWindowPlacement
GetSystemMetrics
PtInRect
RegisterWindowMessageA
DestroyMenu
GetClassNameA
GetSysColor
SetWindowPos
WinHelpA
SetFocus
GetActiveWindow
EqualRect
GetDlgItem
SetWindowLongA
wsprintfA
GetKeyState
GetDlgCtrlID
GetMenu
UnpackDDElParam
ReuseDDElParam
LoadIconA
GetClassInfoA
SetCursor
PeekMessageA
GetCapture
ReleaseCapture
LoadAcceleratorsA
SetActiveWindow
IsWindowVisible
InvalidateRect
IsIconic
InsertMenuItemA
GetMenuItemID
GetMenuItemCount
CreatePopupMenu
IntersectRect
OffsetRect
SetRectEmpty
CopyRect
GetLastActivePopup
BringWindowToTop
PostMessageA
SetMenu
ShowWindow
GetWindowLongA
IsWindow
GetDesktopWindow
GetWindow
IsWindowEnabled
TranslateAcceleratorA
SetMenuItemBitmaps
GetFocus
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
ClientToScreen
GetSubMenu
LoadMenuA
SendMessageA
GetWindowRect
UpdateWindow
EnableWindow
CharUpperA
gdi32
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
CreateRectRgnIndirect
CreateSolidBrush
GetStockObject
CreatePatternBrush
GetPixel
GetWindowExtEx
GetViewportExtEx
DeleteDC
ExtSelectClipRgn
SetBkColor
SetTextColor
GetClipBox
CreateCompatibleDC
CreateCompatibleBitmap
ScaleWindowExtEx
CreateBitmap
SetMapMode
SetBkMode
RestoreDC
SaveDC
DeleteObject
GetTextExtentPoint32A
ExtTextOutA
BitBlt
CreateFontIndirectA
GetDeviceCaps
GetObjectA
comdlg32
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegSetValueA
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
SetFileSecurityA
GetFileSecurityA
RegCreateKeyExA
RegCreateKeyA
RegCloseKey
RegSetValueExA
shell32
SHGetFileInfoA
ExtractIconA
DragQueryFileA
DragFinish
comctl32
ImageList_Draw
ImageList_GetImageInfo
ord17
ImageList_Destroy
oledlg
ord8
ole32
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
oleaut32
OleCreateFontIndirect
VariantChangeType
VariantInit
SysAllocStringLen
SysFreeString
SysStringLen
SysAllocString
SystemTimeToVariantTime
SafeArrayDestroy
VariantClear
VariantCopy
SysAllocStringByteLen
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ