Static task
static1
Behavioral task
behavioral1
Sample
a8b5ec664a5586925d4fc9871c6c1b15_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a8b5ec664a5586925d4fc9871c6c1b15_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a8b5ec664a5586925d4fc9871c6c1b15_JaffaCakes118
-
Size
282KB
-
MD5
a8b5ec664a5586925d4fc9871c6c1b15
-
SHA1
c9edb967ad89c3e6ae7026646c0e64d8edaf3d89
-
SHA256
3526f80730e81ef2bf02112a1f7e680d70f39feb392ec537f24ced4da0a88a7c
-
SHA512
d168212fda9dde3e1bd9008c29d1797046d45fc204e45244427390469051258ae84dae9b72d67a6c1447c2af6b983219925453b41d2e54097847d9545a455b59
-
SSDEEP
6144:1YuUacTcIuw4mPMZ50HFGgGfILJ/Zv/TGmUs+xkFrb+ANbsj:1JnB10w8L5F/TG/k59U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a8b5ec664a5586925d4fc9871c6c1b15_JaffaCakes118
Files
-
a8b5ec664a5586925d4fc9871c6c1b15_JaffaCakes118.exe windows:4 windows x86 arch:x86
1350e794bfa1dcf13d500dc702c56937
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mprapi
MprConfigServerConnect
MprConfigServerDisconnect
MprConfigGetFriendlyName
kernel32
FreeEnvironmentStringsA
AddAtomA
TlsGetValue
GetCPInfo
TlsAlloc
GetOEMCP
VirtualQuery
VirtualFree
IsBadWritePtr
GetFileType
GetStartupInfoA
GetEnvironmentStrings
GetSystemTimeAsFileTime
GetStdHandle
GetModuleFileNameA
InterlockedExchange
GetVersionExA
UnhandledExceptionFilter
EnumResourceLanguagesA
HeapDestroy
GetCurrentProcessId
SetHandleCount
FreeEnvironmentStringsW
lstrcpynW
GetEnvironmentStringsW
GetACP
TlsFree
GetLocaleInfoA
QueryPerformanceCounter
SetLastError
VirtualAlloc
GetSystemInfo
HeapSize
HeapCreate
WriteFile
TlsSetValue
SetEndOfFile
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
setupapi
CM_Get_Parent
SetupDiGetDeviceRegistryPropertyW
CMP_WaitNoPendingInstallEvents
CM_Get_DevNode_Status
iphlpapi
GetIpAddrTable
shell32
SHGetFolderPathW
newdev
UpdateDriverForPlugAndPlayDevicesW
user32
IsWindow
SendMessageA
EnumChildWindows
GetDlgItem
DestroyWindow
CreateWindowExW
GetWindowThreadProcessId
Sections
.text Size: 140KB - Virtual size: 275KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 138KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ