Static task
static1
Behavioral task
behavioral1
Sample
bf7c9edfd535767fefcb1f66e5a2604a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bf7c9edfd535767fefcb1f66e5a2604a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bf7c9edfd535767fefcb1f66e5a2604a_JaffaCakes118
-
Size
202KB
-
MD5
bf7c9edfd535767fefcb1f66e5a2604a
-
SHA1
5e9d7a9ad91f37f7af3546f5d42c619d3fe4307f
-
SHA256
af76174ae87e0a57ee20f8c61b8aeb0a2c5aede18f4075354627612389c7a0a2
-
SHA512
5b10da79b2458626b4bcbec6e5402b86a9410aa71c5cdc198a6b545b868643ec320b4f3f16ab7ec265c5014aa7090ec39680a46ec49d00090fa89807448d07a9
-
SSDEEP
6144:DJukBeNsKCa6aT6MAS3OyEU4wEqwnhIPC9kjilMyu:RKz6a0PfIPSkjJz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bf7c9edfd535767fefcb1f66e5a2604a_JaffaCakes118
Files
-
bf7c9edfd535767fefcb1f66e5a2604a_JaffaCakes118.exe windows:4 windows x86 arch:x86
56be3450ccb553f236267360fea1ca75
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetIpAddrTable
kernel32
AddAtomA
WriteFile
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetStartupInfoA
UnhandledExceptionFilter
EnumResourceLanguagesA
GetEnvironmentStringsW
GetOEMCP
GetStringTypeExW
GetCPInfo
GetEnvironmentStrings
SetUnhandledExceptionFilter
user32
GetDlgItem
CreateWindowExW
SendMessageA
EnumChildWindows
IsWindow
DestroyWindow
GetWindowThreadProcessId
mprapi
MprConfigServerDisconnect
MprConfigServerConnect
MprConfigGetFriendlyName
shell32
SHGetFolderPathW
setupapi
CM_Get_Parent
SetupDiGetDeviceRegistryPropertyW
CMP_WaitNoPendingInstallEvents
CM_Get_DevNode_Status
newdev
UpdateDriverForPlugAndPlayDevicesW
Sections
.text Size: 136KB - Virtual size: 268KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 138KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ