Static task
static1
Behavioral task
behavioral1
Sample
d14605473089e6c0948ff15bf2163d3a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d14605473089e6c0948ff15bf2163d3a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d14605473089e6c0948ff15bf2163d3a_JaffaCakes118
-
Size
1.5MB
-
MD5
d14605473089e6c0948ff15bf2163d3a
-
SHA1
263550c1f2180cbe48f226331d0122054c256ed8
-
SHA256
191038483698378d183ad312ac1dfe9adc62fabb8b5db7e23c03a13c7cfd0294
-
SHA512
9e9f77d95d97a93040e72881cbd3c94fa61c02b5496f0a22caef12ad078129c08e955deb6be9f3a58f5400078552d88c2b717ba19451ff2ce613e358373925cd
-
SSDEEP
24576:Cd1p2cu0IWs4TYxiQajAgMQzkoHtw4HlDXiM59ghpVrJgvFkcLjxBpopp3s:+p2yrmiQK4EtwmkhpFJgvFrLjxu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d14605473089e6c0948ff15bf2163d3a_JaffaCakes118
Files
-
d14605473089e6c0948ff15bf2163d3a_JaffaCakes118.exe windows:4 windows x86 arch:x86
9d3dfb2fffaf64d305b404e7b286b676
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
GetProcAddress
advapi32
RegOpenKeyA
dinput8
DirectInput8Create
devil
ilLoad
gdi32
DeleteDC
imm32
ImmIsIME
oleaut32
VariantInit
shell32
SHGetSpecialFolderPathA
speedtreert
??0CSpeedTreeRT@@QAE@XZ
user32
GetDC
version
VerQueryValueA
winmm
timeGetTime
ws2_32
send
d3d8
Direct3DCreate8
granny2
_GrannyFreeFile@4
imagehlp
StackWalk
mss32
_AIL_startup@0
ole32
OleInitialize
python22
PyDict_New
Sections
.MPRESS1 Size: 1.5MB - Virtual size: 4.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MPRESS2 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE