Static task
static1
Behavioral task
behavioral1
Sample
2f487b30782d3d3be57dd9698603f79f_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
2f487b30782d3d3be57dd9698603f79f_JaffaCakes118
-
Size
177KB
-
MD5
2f487b30782d3d3be57dd9698603f79f
-
SHA1
33a744eb3a9f3ddd7c63a267a606c58e39195c78
-
SHA256
95b62b15bd872413910961ddff9daee27c4afdf9f8f97b1fb6ec6bbf97ca11f9
-
SHA512
620b3e4f5102a33b53594aff8a777dd3d6e88a56c49173557913c8db0d70224ad80226dd42d04b35ef2e2a53eb6751b0e7b54215fda983f69345b731249615fe
-
SSDEEP
3072:smyJYgmxTkcOmE1bw8M6eC8Feb9eDlSB0l/cJXEHDNSbDEorP06nf1/di4F:Dyig6TVj8leysDMo+WDNS3s6fd44F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f487b30782d3d3be57dd9698603f79f_JaffaCakes118
Files
-
2f487b30782d3d3be57dd9698603f79f_JaffaCakes118.exe windows:4 windows x86 arch:x86
43571b11169e4d428e8c8387287dacde
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msimg32
AlphaBlend
TransparentBlt
winmm
mciSendCommandW
sndPlaySoundW
kernel32
MapViewOfFile
CreateFileA
ExitProcess
GlobalAddAtomW
GetModuleHandleW
CreateFileMappingA
CreateFileW
TlsGetValue
InterlockedDecrement
FlushFileBuffers
WriteConsoleW
TlsSetValue
GetVersionExA
HeapFree
LoadLibraryExW
GetVersionExW
EnumResourceNamesA
GetProcessHeap
GetTempPathW
InterlockedIncrement
GetProcAddress
VerLanguageNameA
UnmapViewOfFile
SetLastError
TlsAlloc
GetModuleHandleA
TlsFree
GetLastError
GetEnvironmentVariableW
HeapAlloc
GetConsoleMode
GetConsoleCP
Sleep
setupapi
InstallCatalog
SetupDiGetDeviceRegistryPropertyA
CMP_WaitNoPendingInstallEvents
CM_Get_DevNode_Status
shlwapi
PathAddBackslashW
Sections
.text Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ