Static task
static1
Behavioral task
behavioral1
Sample
312678b6c640764b71598a746bb1069e_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
312678b6c640764b71598a746bb1069e_JaffaCakes118
-
Size
285KB
-
MD5
312678b6c640764b71598a746bb1069e
-
SHA1
2fd74177e53dffa2f1b98331d26fe013116bff4d
-
SHA256
7c03d06aaa771287b7115f428e16976c284e25cd4992d995ceb15afa6e470a94
-
SHA512
9fa0de912e51279015ca96d1a31d8fa33fac9c82cfec4ad70eeb74b6e498c1407af1616fa0c795b414ad58add50e97621cff22602e6815ca71397aadee9b1814
-
SSDEEP
6144:ySj69k1C+p22wtN+zLrGqBihXTaKDCFO01hQU/ko:fj6+OT+vSGitTaKDsxN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 312678b6c640764b71598a746bb1069e_JaffaCakes118
Files
-
312678b6c640764b71598a746bb1069e_JaffaCakes118.exe windows:4 windows x86 arch:x86
ae438ab08519c405cbf008b140e56041
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetIpAddrTable
mprapi
MprConfigServerConnect
MprConfigServerDisconnect
MprConfigGetFriendlyName
shell32
SHGetFolderPathW
newdev
UpdateDriverForPlugAndPlayDevicesW
setupapi
CM_Get_Parent
SetupDiGetDeviceRegistryPropertyW
CMP_WaitNoPendingInstallEvents
CM_Get_DevNode_Status
user32
CreateWindowExW
EnumChildWindows
DestroyWindow
SendMessageA
GetDlgItem
IsWindow
GetWindowThreadProcessId
kernel32
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
VirtualAlloc
GetOEMCP
FreeEnvironmentStringsA
AddAtomA
GetEnvironmentStrings
VirtualFree
TlsFree
GetVersionExA
VirtualQuery
GetModuleFileNameA
SetEndOfFile
TlsGetValue
FreeEnvironmentStringsW
GetSystemTimeAsFileTime
GetCPInfo
EnumResourceLanguagesA
GetEnvironmentStringsW
HeapSize
GetACP
QueryPerformanceCounter
SetHandleCount
HeapCreate
TlsAlloc
WriteFile
InterlockedExchange
FormatMessageW
GetCurrentProcessId
SetLastError
TlsSetValue
GetSystemInfo
GetStdHandle
GetFileType
GetLocaleInfoA
GetCurrentProcess
HeapDestroy
IsBadWritePtr
SetUnhandledExceptionFilter
Sections
.text Size: 152KB - Virtual size: 280KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 129KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ