Static task
static1
Behavioral task
behavioral1
Sample
7555fa82400eef9e9af4a73f8f65d6cc_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7555fa82400eef9e9af4a73f8f65d6cc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7555fa82400eef9e9af4a73f8f65d6cc_JaffaCakes118
-
Size
282KB
-
MD5
7555fa82400eef9e9af4a73f8f65d6cc
-
SHA1
23e0decff1376cbb4b3f405b5d225001db2bdd7f
-
SHA256
4abd967bd77a75611dd4ae57456f0d8a40cab225c63c41501878beb0d85303a1
-
SHA512
3260633c459d615246606089abbac11ac2bcc0c91b8d220a8ac3b87e0aa551df6847c871c5e8580654b9d0abfe68183b2e3a6b3af1a86c160477c5ec264c8406
-
SSDEEP
6144:crPrHEYF57R69Um+nEY0kqk4PXzCPamiHtRNCI6X:2HXF9R6ym+skK07mKX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 7555fa82400eef9e9af4a73f8f65d6cc_JaffaCakes118
Files
-
7555fa82400eef9e9af4a73f8f65d6cc_JaffaCakes118.exe windows:4 windows x86 arch:x86
a720bc810f6a2bc8b444571c156db966
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentStringsW
VirtualAlloc
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetOEMCP
AddAtomA
GetFileType
WriteFile
TlsSetValue
GetSystemInfo
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetACP
GetStdHandle
TlsGetValue
SetEndOfFile
VirtualFree
VirtualQuery
EnumResourceNamesA
TerminateProcess
SetLastError
GetStartupInfoA
lstrcatA
InterlockedExchange
TlsAlloc
GetEnvironmentStrings
TlsFree
GetCurrentProcess
SetHandleCount
HeapDestroy
FreeEnvironmentStringsA
GetModuleFileNameA
IsBadWritePtr
GetVersionExA
HeapCreate
GetCPInfo
GetLocaleInfoA
SetUnhandledExceptionFilter
shell32
SHGetFolderPathW
setupapi
CM_Get_Global_State
CMP_WaitNoPendingInstallEvents
SetupDiGetDeviceRegistryPropertyW
CM_Get_DevNode_Status
iphlpapi
GetIpAddrTable
mprapi
MprConfigServerConnect
MprConfigServerDisconnect
MprConfigGetFriendlyName
newdev
UpdateDriverForPlugAndPlayDevicesW
user32
CreateWindowExW
DestroyWindow
GetDlgItem
SendMessageA
EnumChildWindows
IsWindow
GetWindowThreadProcessId
Sections
.text Size: 142KB - Virtual size: 278KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ