Static task
static1
Behavioral task
behavioral1
Sample
d45c7d9e129cb771be817448aff7ec3f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d45c7d9e129cb771be817448aff7ec3f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d45c7d9e129cb771be817448aff7ec3f_JaffaCakes118
-
Size
180KB
-
MD5
d45c7d9e129cb771be817448aff7ec3f
-
SHA1
b7459beef92adb0339f0125b1916634fd95036c2
-
SHA256
0ca95f2f96b93ff60fc3c637275bfbd038de9fd2ae6e85a49add8c3901e4a81a
-
SHA512
8af4135050bc739d29daf81c9849d48082ca796967548e9d1db49eaec37b0f3306e3351e48101579b6282a5d6de6d4df51425e277a0d311b4c9a95d59302bce9
-
SSDEEP
3072:SMFlD5TQnyuPTE4UfdGALnkrN9NMGabBd4vjwoVMZQ8pBeKbw+Xrb5CTCHw6qGXL:SMFlD5TQnyuPTE4UfdGALnWN9mGabBwM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d45c7d9e129cb771be817448aff7ec3f_JaffaCakes118
Files
-
d45c7d9e129cb771be817448aff7ec3f_JaffaCakes118.exe windows:4 windows x86 arch:x86
3aeedd20992510c1548f859d6dd25744
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ddraw
AcquireDDThreadLock
DirectDrawEnumerateA
GetDDSurfaceLocal
DirectDrawCreate
DirectDrawCreateEx
DSoundHelp
DirectDrawEnumerateExA
DirectDrawCreateClipper
DDInternalLock
D3DParseUnknownCommand
GetOLEThunkData
kernel32
GetConsoleMode
GetFileSizeEx
DeleteFileA
GlobalAddAtomW
ScrollConsoleScreenBufferW
GetConsoleScreenBufferInfo
GetFileAttributesExW
VirtualAlloc
CreateMailslotA
VirtualFree
ExitProcess
lstrcat
LockFile
tapi32
phoneSetVolume
MMCAddProvider
Sections
.data Size: - Virtual size: 816KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE