Static task
static1
Behavioral task
behavioral1
Sample
d0af6d7050278245125ef824b221ec91_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0af6d7050278245125ef824b221ec91_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d0af6d7050278245125ef824b221ec91_JaffaCakes118
-
Size
14KB
-
MD5
d0af6d7050278245125ef824b221ec91
-
SHA1
81e291198471da145f56410e868514514aa61b74
-
SHA256
2d1ad5e99819babd31166a6f259381714de9784ac93c878782cbea0431d46d54
-
SHA512
9091e8af53941f7a9d990d1e2e6f466b4fb57804413ad32995a159265f6b055084d4b9c068ec2765ee71cf0f5ad0795f639a8efd1f1fec9199164ef65dd97840
-
SSDEEP
384:8qsfT/WLU6jZW9YcGN3aVPVbAPWrx7DYp:8qy+s6cKq3bAOdD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d0af6d7050278245125ef824b221ec91_JaffaCakes118
Files
-
d0af6d7050278245125ef824b221ec91_JaffaCakes118.exe windows:6 windows x86 arch:x86
7496979ec66e049217425eaf8458c96a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
GetProcAddress
api-ms-win-crt-stdio-l1-1-0
_set_fmode
api-ms-win-crt-filesystem-l1-1-0
_wfullpath
shlwapi
PathRemoveFileSpecW
advapi32
OpenServiceW
cx_logging.cp35-win32.pyd
LogMessage
python35
Py_SetPath
api-ms-win-crt-runtime-l1-1-0
exit
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
_free_base
api-ms-win-crt-string-l1-1-0
_wcsicmp
Sections
.MPRESS1 Size: 11KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MPRESS2 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 472B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE