Static task
static1
Behavioral task
behavioral1
Sample
30bd8badac1371a24737089e510df41f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
30bd8badac1371a24737089e510df41f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
30bd8badac1371a24737089e510df41f_JaffaCakes118
-
Size
38KB
-
MD5
30bd8badac1371a24737089e510df41f
-
SHA1
cbb8b3bfd0dfd453910de9fd83b9325db478f93f
-
SHA256
e8e41079862b0d1ff9ec0e0eaab7158cda89d8163a60c13fd727ea259f944bbf
-
SHA512
88bed4c1bafe0695993905c9a4cfc419f971edbbe89b36e558da6992b980e04453d6ba511401dd3d4cdf29d576d9e10afae776df6b6824ee9889c8325d6c9ee1
-
SSDEEP
768:b8Q6l54NnTOLXcYruoP2ziU5RQTa/RDzF58IcSjkKO:b8Q6zcYKouiU5uTsJF58IcSjk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30bd8badac1371a24737089e510df41f_JaffaCakes118
Files
-
30bd8badac1371a24737089e510df41f_JaffaCakes118.exe windows:1 windows x86 arch:x86
13d5ae5ecd6d3ff9d1f93f43c0a30305
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSAGetLastError
__WSAFDIsSet
closesocket
connect
gethostbyname
getsockname
htons
inet_addr
inet_ntoa
recv
select
send
socket
wininet
InternetCloseHandle
InternetOpenA
HttpAddRequestHeadersA
HttpQueryInfoA
shell32
SHGetSpecialFolderPathA
netapi32
NetLocalGroupAddMembers
NetUserAdd
NetUserDel
NetUserSetInfo
setupapi
SetupIterateCabinetA
secur32
LsaFreeReturnBuffer
LsaEnumerateLogonSessions
LsaGetLogonSessionData
psapi
EnumProcesses
kernel32
DeleteFileA
FindResourceA
FreeLibrary
GetCommandLineA
GetCurrentProcess
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessId
GetSystemDirectoryA
CloseHandle
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersionExA
GetVolumeInformationA
GetWindowsDirectoryA
InterlockedExchange
InterlockedIncrement
IsBadWritePtr
LoadLibraryA
LoadResource
LocalAlloc
LocalFree
LockResource
MultiByteToWideChar
OpenMutexA
OpenProcess
Process32First
CreateDirectoryA
ReadFile
RtlUnwind
RtlZeroMemory
SetFilePointer
SizeofResource
Sleep
WaitForSingleObject
WideCharToMultiByte
WinExec
WriteFile
lstrlenA
CreateProcessA
CreateThread
user32
ExitWindowsEx
gdi32
CreateSolidBrush
advapi32
AllocateAndInitializeSid
FreeSid
LookupAccountSidW
LookupPrivilegeValueA
DuplicateTokenEx
LogonUserA
CreateProcessAsUserA
ChangeServiceConfigA
ChangeServiceConfig2A
CloseServiceHandle
ControlService
CreateServiceA
DeleteService
OpenSCManagerA
OpenServiceA
QueryServiceConfigA
QueryServiceStatus
RegisterServiceCtrlHandlerA
StartServiceA
StartServiceCtrlDispatcherA
OpenProcessToken
GetTokenInformation
AdjustTokenPrivileges
EqualSid
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetKeySecurity
RegSetValueExA
RegSetValueExW
SetEntriesInAclA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
comctl32
InitCommonControls
shlwapi
StrStrIA
crtdll
__GetMainArgs
_vsnprintf
atol
exit
free
malloc
memcmp
memcpy
memset
raise
rand
signal
sprintf
srand
strcat
strchr
strcmp
strncmp
strrchr
strstr
time
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 5KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE