Static task
static1
Behavioral task
behavioral1
Sample
30d8085ea468b302f313925598e6a73f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
30d8085ea468b302f313925598e6a73f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
30d8085ea468b302f313925598e6a73f_JaffaCakes118
-
Size
173KB
-
MD5
30d8085ea468b302f313925598e6a73f
-
SHA1
ba75b8d3d5a26b2f26c2a6c26afd78302afe647c
-
SHA256
b795976ee35e495abedae99a0517f23d3a3b204bc4cb7740d0154ea0e19193b1
-
SHA512
8dca9bd8ca04171f67096fda0135edae68d47d79b6b020b56c9e7ec0f55a33c72b2724cc806e2871d92f833f0054743d0d580397eddfa8fbfae863de1a063f99
-
SSDEEP
3072:id68GaOpr97exOI9RM2frF9BMa70Ti/aFVLi5sHif+loGSmzFvPkz+3ofC:iwLr97esURMelM4ALiDjmzKz+4a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30d8085ea468b302f313925598e6a73f_JaffaCakes118
Files
-
30d8085ea468b302f313925598e6a73f_JaffaCakes118.exe windows:4 windows x86 arch:x86
b692603dc504ed524513fab4d5fa7605
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyW
RegCreateKeyExW
RegEnumKeyW
RegOpenKeyExW
RegCloseKey
RegEnumKeyExW
RegQueryValueW
RegQueryInfoKeyW
RegSetValueExW
RegDeleteKeyW
RegQueryValueExW
user32
SendDlgItemMessageA
GetNextDlgTabItem
SetRect
SetPropW
CreateWindowExW
GetClassInfoExW
GetClassLongW
MessageBeep
GetPropW
RemovePropW
RegisterWindowMessageW
CharUpperW
InvalidateRect
InvalidateRgn
CharNextW
GetNextDlgGroupItem
WinHelpW
CopyAcceleratorTableW
IsRectEmpty
DestroyMenu
shell32
SHCreateDirectoryExW
SHGetSpecialFolderPathW
gdi32
RectVisible
TextOutW
SetViewportOrgEx
ScaleWindowExtEx
ExtSelectClipRgn
SetWindowExtEx
ScaleViewportExtEx
Escape
GetBkColor
GetMapMode
PtVisible
GetTextColor
GetDeviceCaps
DeleteDC
GetStockObject
ExtTextOutW
OffsetViewportOrgEx
SelectObject
GetRgnBox
oleacc
LresultFromObject
CreateStdAccessibleObject
shlwapi
PathRemoveFileSpecW
PathFindFileNameW
PathFindExtensionW
PathIsUNCW
PathStripToRootW
PathFileExistsW
PathAppendW
ole32
CreateILockBytesOnHGlobal
CLSIDFromProgID
CoTaskMemAlloc
OleInitialize
OleUninitialize
OleFlushClipboard
CoCreateInstance
StgOpenStorageOnILockBytes
CoRevokeClassObject
CoUninitialize
StgCreateDocfileOnILockBytes
OleIsCurrentClipboard
CoRegisterMessageFilter
CoGetClassObject
CoInitialize
CoFreeUnusedLibraries
CoTaskMemFree
CLSIDFromString
kernel32
ConvertDefaultLocale
GetCalendarInfoW
GetCurrentDirectoryW
LocalFileTimeToFileTime
SetFilePointer
SetFileTime
MoveFileW
WriteFile
RemoveDirectoryW
LoadLibraryW
GetVersion
GetThreadContext
GetSystemDefaultLangID
FindClose
GetModuleFileNameW
EnumResourceNamesA
ReadFile
GetCurrentProcessId
DeleteFileW
lstrcpyW
EnumResourceLanguagesW
ExitProcess
InterlockedDecrement
WideCharToMultiByte
FindFirstFileW
FindNextFileW
GetLocaleInfoW
SystemTimeToFileTime
MultiByteToWideChar
GetFileAttributesW
CreateFileW
CreateDirectoryW
GetProcAddress
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ