Static task
static1
Behavioral task
behavioral1
Sample
b2e09f851adb7b0f139c02fa79da10f6_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b2e09f851adb7b0f139c02fa79da10f6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b2e09f851adb7b0f139c02fa79da10f6_JaffaCakes118
-
Size
282KB
-
MD5
b2e09f851adb7b0f139c02fa79da10f6
-
SHA1
04759828d3492d0bded0739d911a3789dd5c1078
-
SHA256
c094ba75930bd8978a20852387994de4b68e670676a6b301a3b781df8aa3efe0
-
SHA512
a5731a1ef08d2fb7e65ba0a9337d28cc2e272665b3f171c8c3496151d68ce3ac229aa26f6af002c4af606395de6003a34d72f134564713380ea383349a6337af
-
SSDEEP
6144:1YuUarTcIuw4mPMZ50HFGgGfILJ/Zv/TGmUs+xkFrb+ANbsj:1JSB10w8L5F/TG/k59U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b2e09f851adb7b0f139c02fa79da10f6_JaffaCakes118
Files
-
b2e09f851adb7b0f139c02fa79da10f6_JaffaCakes118.exe windows:4 windows x86 arch:x86
1350e794bfa1dcf13d500dc702c56937
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mprapi
MprConfigServerConnect
MprConfigServerDisconnect
MprConfigGetFriendlyName
kernel32
FreeEnvironmentStringsA
AddAtomA
TlsGetValue
GetCPInfo
TlsAlloc
GetOEMCP
VirtualQuery
VirtualFree
IsBadWritePtr
GetFileType
GetStartupInfoA
GetEnvironmentStrings
GetSystemTimeAsFileTime
GetStdHandle
GetModuleFileNameA
InterlockedExchange
GetVersionExA
UnhandledExceptionFilter
EnumResourceLanguagesA
HeapDestroy
GetCurrentProcessId
SetHandleCount
FreeEnvironmentStringsW
lstrcpynW
GetEnvironmentStringsW
GetACP
TlsFree
GetLocaleInfoA
QueryPerformanceCounter
SetLastError
VirtualAlloc
GetSystemInfo
HeapSize
HeapCreate
WriteFile
TlsSetValue
SetEndOfFile
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
setupapi
CM_Get_Parent
SetupDiGetDeviceRegistryPropertyW
CMP_WaitNoPendingInstallEvents
CM_Get_DevNode_Status
iphlpapi
GetIpAddrTable
shell32
SHGetFolderPathW
newdev
UpdateDriverForPlugAndPlayDevicesW
user32
IsWindow
SendMessageA
EnumChildWindows
GetDlgItem
DestroyWindow
CreateWindowExW
GetWindowThreadProcessId
Sections
.text Size: 140KB - Virtual size: 275KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 138KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ