Static task
static1
Behavioral task
behavioral1
Sample
25a3b8cf04a54bc657207ada02eaef17_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
25a3b8cf04a54bc657207ada02eaef17_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
25a3b8cf04a54bc657207ada02eaef17_JaffaCakes118
-
Size
366KB
-
MD5
25a3b8cf04a54bc657207ada02eaef17
-
SHA1
f5237f3d23cedeb4c9a2fd77450f9d78cfd7e433
-
SHA256
000eed9e7ae746e44361612293378f4d1126713f88fe63d0512a8c6b49da6bea
-
SHA512
fc7c7caef846cc2fb35e3a41f9c13baf66ed08e6aad46a062e48ea3da58359c6d44a9453a16c9cebf930d5f0819055c62e061474c2bf804ed44f1bc5fce9849a
-
SSDEEP
6144:NqIEn69TDrhgVKm4Z0zSonm+6NBHDphRkCQihxNdI+6xgTAVhYvUgWj+HJOo/x69:bE6Z2bSonm+63DxkCQihWNxkaYv+UbJk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 25a3b8cf04a54bc657207ada02eaef17_JaffaCakes118
Files
-
25a3b8cf04a54bc657207ada02eaef17_JaffaCakes118.exe windows:4 windows x86 arch:x86
7a310c80fc53301d29f934703ccf6286
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegSetValueExW
RegDeleteKeyA
RegQueryInfoKeyW
gdi32
RealizePalette
GetObjectA
SetStretchBltMode
BitBlt
DeleteObject
CreateCompatibleDC
kernel32
GetFileAttributesW
CreateThread
FindFirstFileW
MapViewOfFile
InterlockedDecrement
FormatMessageW
DuplicateHandle
CopyFileW
GetStdHandle
OpenProcess
GetUserDefaultUILanguage
IsDBCSLeadByte
OutputDebugStringW
FreeLibrary
GetUserDefaultLCID
GetModuleFileNameW
GlobalAlloc
FindClose
VirtualAlloc
InterlockedIncrement
GetFileAttributesExW
WideCharToMultiByte
CreateProcessA
GetLastError
CreateMutexA
GetModuleHandleW
GetSystemDefaultLCID
GetModuleHandleA
GetTickCount
InterlockedCompareExchange
GetCurrentProcess
SetUnhandledExceptionFilter
ExitProcess
CreateFileW
ReleaseMutex
TlsFree
MulDiv
lstrlenW
AddAtomW
TlsSetValue
GetFileAttributesA
VirtualFree
SetEvent
EnumDateFormatsA
EnterCriticalSection
lstrcmpiA
RaiseException
WriteFile
HeapReAlloc
TerminateProcess
DeleteCriticalSection
GetSystemTimeAsFileTime
GetSystemTime
GetLocaleInfoA
CreateDirectoryW
LocalFree
HeapSize
GetStartupInfoA
QueryPerformanceCounter
GetVersion
LoadLibraryA
FindNextFileW
FindResourceA
HeapDestroy
GlobalLock
CreateProcessW
GetCurrentThreadId
lstrcpyA
CreateEventA
GetCurrentProcessId
EnumSystemCodePagesA
UnmapViewOfFile
SystemTimeToFileTime
InterlockedExchange
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
lstrlenA
CloseHandle
Sleep
FindAtomW
IsDebuggerPresent
CreateFileMappingA
LoadLibraryExA
GetProcessHeap
GlobalFree
lstrcpynW
GetACP
CreateFileMappingW
CompareFileTime
WaitForSingleObject
LoadResource
UnhandledExceptionFilter
GetProcAddress
LCMapStringA
MoveFileW
HeapAlloc
GlobalUnlock
GetThreadLocale
GetModuleFileNameA
DeleteAtom
GetVersionExA
LockResource
SizeofResource
MultiByteToWideChar
HeapFree
LCMapStringW
FlushFileBuffers
TlsGetValue
TlsAlloc
LoadLibraryExW
user32
CreateWindowExA
MessageBoxA
LoadBitmapA
GetSystemMetrics
RegisterClassA
CharNextA
LoadImageA
SystemParametersInfoA
LoadIconA
MessageBoxW
BeginPaint
DestroyWindow
LoadStringW
UnregisterClassA
SetForegroundWindow
CharNextW
Sections
.text Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ