Static task
static1
Behavioral task
behavioral1
Sample
e5638483b1e667b623101e4a4815d229_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e5638483b1e667b623101e4a4815d229_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e5638483b1e667b623101e4a4815d229_JaffaCakes118
-
Size
282KB
-
MD5
e5638483b1e667b623101e4a4815d229
-
SHA1
62f596d729a3eb08554787c77f80d387d49f117e
-
SHA256
67fd9c21a9f3ddcd5bfe3a2368e5cc0f60622fd484d79b234e83493aef665196
-
SHA512
e7fc2f61b9a8d760f08f5677f4f72947f1c1c7b4e0c2405d70167dabbf29c8290ad22a4b95c66765b87f85885ca533bf73dd60d3ca995438936db87ca8f7285e
-
SSDEEP
6144:crPrgEYF57R69Um+nEY0kqk4PXzCPamiHtRNCI6X:2gXF9R6ym+skK07mKX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e5638483b1e667b623101e4a4815d229_JaffaCakes118
Files
-
e5638483b1e667b623101e4a4815d229_JaffaCakes118.exe windows:4 windows x86 arch:x86
a720bc810f6a2bc8b444571c156db966
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentStringsW
VirtualAlloc
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetOEMCP
AddAtomA
GetFileType
WriteFile
TlsSetValue
GetSystemInfo
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetACP
GetStdHandle
TlsGetValue
SetEndOfFile
VirtualFree
VirtualQuery
EnumResourceNamesA
TerminateProcess
SetLastError
GetStartupInfoA
lstrcatA
InterlockedExchange
TlsAlloc
GetEnvironmentStrings
TlsFree
GetCurrentProcess
SetHandleCount
HeapDestroy
FreeEnvironmentStringsA
GetModuleFileNameA
IsBadWritePtr
GetVersionExA
HeapCreate
GetCPInfo
GetLocaleInfoA
SetUnhandledExceptionFilter
shell32
SHGetFolderPathW
setupapi
CM_Get_Global_State
CMP_WaitNoPendingInstallEvents
SetupDiGetDeviceRegistryPropertyW
CM_Get_DevNode_Status
iphlpapi
GetIpAddrTable
mprapi
MprConfigServerConnect
MprConfigServerDisconnect
MprConfigGetFriendlyName
newdev
UpdateDriverForPlugAndPlayDevicesW
user32
CreateWindowExW
DestroyWindow
GetDlgItem
SendMessageA
EnumChildWindows
IsWindow
GetWindowThreadProcessId
Sections
.text Size: 142KB - Virtual size: 278KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ