Static task
static1
Behavioral task
behavioral1
Sample
88bfaeadeb1138714046911cd1727aac_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
88bfaeadeb1138714046911cd1727aac_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
88bfaeadeb1138714046911cd1727aac_JaffaCakes118
-
Size
282KB
-
MD5
88bfaeadeb1138714046911cd1727aac
-
SHA1
8771fdfd688e7e63e2644c8778495516f0f36b8c
-
SHA256
a98c0abb47e4dd7dd82140e99fedc242352af5603f342d887c762081eeb28ca1
-
SHA512
521126922485de7a291b41765819c4c1537944793689dc2a0af10ed6547110482dbd6c71d5e985b70915090052bc8811cec716f507dc97518db1b2dd1e2b8ea1
-
SSDEEP
6144:1YuUabTcIuw4mPMZ50HFGgGfILJ/Zv/TGmUs+xkFrb+ANbsj:1JCB10w8L5F/TG/k59U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 88bfaeadeb1138714046911cd1727aac_JaffaCakes118
Files
-
88bfaeadeb1138714046911cd1727aac_JaffaCakes118.exe windows:4 windows x86 arch:x86
1350e794bfa1dcf13d500dc702c56937
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mprapi
MprConfigServerConnect
MprConfigServerDisconnect
MprConfigGetFriendlyName
kernel32
FreeEnvironmentStringsA
AddAtomA
TlsGetValue
GetCPInfo
TlsAlloc
GetOEMCP
VirtualQuery
VirtualFree
IsBadWritePtr
GetFileType
GetStartupInfoA
GetEnvironmentStrings
GetSystemTimeAsFileTime
GetStdHandle
GetModuleFileNameA
InterlockedExchange
GetVersionExA
UnhandledExceptionFilter
EnumResourceLanguagesA
HeapDestroy
GetCurrentProcessId
SetHandleCount
FreeEnvironmentStringsW
lstrcpynW
GetEnvironmentStringsW
GetACP
TlsFree
GetLocaleInfoA
QueryPerformanceCounter
SetLastError
VirtualAlloc
GetSystemInfo
HeapSize
HeapCreate
WriteFile
TlsSetValue
SetEndOfFile
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
setupapi
CM_Get_Parent
SetupDiGetDeviceRegistryPropertyW
CMP_WaitNoPendingInstallEvents
CM_Get_DevNode_Status
iphlpapi
GetIpAddrTable
shell32
SHGetFolderPathW
newdev
UpdateDriverForPlugAndPlayDevicesW
user32
IsWindow
SendMessageA
EnumChildWindows
GetDlgItem
DestroyWindow
CreateWindowExW
GetWindowThreadProcessId
Sections
.text Size: 140KB - Virtual size: 275KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 138KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ