Static task
static1
Behavioral task
behavioral1
Sample
cfc702c6a8f66963b472dcdd7b133111_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfc702c6a8f66963b472dcdd7b133111_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cfc702c6a8f66963b472dcdd7b133111_JaffaCakes118
-
Size
4.6MB
-
MD5
cfc702c6a8f66963b472dcdd7b133111
-
SHA1
c50e3673f65d761217add0ee2ee5f69932850f1e
-
SHA256
90ddaef10084c4ea607da5608f2e19551bdb7c4bba7b3092ebe5a077f31f3a04
-
SHA512
81b7094be4da0cadcbe378ae6e9f8392526e69ce9ff6c5361cb96cfe8e3d2058f875b693975620964ef1ddfe34fb8e94d113131047bc88fc3282b73fcd9cc646
-
SSDEEP
98304:i2sHOW4MvvaAhAFgFsuPt4SBwxXn3kQ0DUR:i2sHOW4QaAhAFIPWSV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cfc702c6a8f66963b472dcdd7b133111_JaffaCakes118
Files
-
cfc702c6a8f66963b472dcdd7b133111_JaffaCakes118.exe windows:4 windows x86 arch:x86
b7dbe943851fcb97a4d6ec00086e31c7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
ExitProcess
advapi32
RegCreateKeyA
gdi32
CreateCompatibleDC
user32
MessageBoxA
version
GetFileVersionInfoA
ws2_32
send
binkw32
_BinkWait@4
mss32
_AIL_set_filter_preference@12
d3dx9_30
D3DXLoadSurfaceFromSurface
d3d9
Direct3DCreate9
dinput8
DirectInput8Create
wininet
HttpOpenRequestA
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
Sections
.text Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 756KB - Virtual size: 753KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
stxt774 Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
stxt371 Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE