Static task
static1
Behavioral task
behavioral1
Sample
25c6fa2caf9455efa20b65702d9207ae_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
25c6fa2caf9455efa20b65702d9207ae_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
25c6fa2caf9455efa20b65702d9207ae_JaffaCakes118
-
Size
57KB
-
MD5
25c6fa2caf9455efa20b65702d9207ae
-
SHA1
3962c097d50f3acaa39933dfb475733023228799
-
SHA256
693d53fd17c44d0a7952e41d471025e6c500d72b3f842921ae2080efc507b2ad
-
SHA512
f48b2104280d8992295f6df01dcc7de2077789bc2fee470e6c6d8d9df3960fa633440fed350edd1909515827cf01c9973f5900be96a3b348152540fcf16fa3a1
-
SSDEEP
768:Lp6L57q8u5f1dN6r91p6L57q8us1fFdN6rG:dUGz9UUGe1Nf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 25c6fa2caf9455efa20b65702d9207ae_JaffaCakes118
Files
-
25c6fa2caf9455efa20b65702d9207ae_JaffaCakes118.exe windows:4 windows x86 arch:x86
2cb3806c22e8dd434291c326e768ffc4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateThread
CreateFileA
CloseHandle
IsBadStringPtrW
TlsGetValue
LocalFree
FindResourceA
SetLastError
LoadLibraryW
GlobalUnlock
GetModuleHandleA
lstrlen
PulseEvent
GetEnvironmentVariableA
ReleaseMutex
FindClose
Sleep
HeapCreate
GetACP
CreateMutexA
user32
CopyRect
CallWindowProcA
IsWindow
DrawEdge
CheckRadioButton
DefWindowProcW
DispatchMessageA
SetFocus
FillRect
GetDlgItem
GetDC
GetIconInfo
DrawMenuBar
msasn1
ASN1BERDecNull
ASN1BEREncEoid
ASN1BEREncBool
ASN1BERDecBool
ASN1BERDecCheck
dpnet
DirectPlay8Create
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE