Static task
static1
Behavioral task
behavioral1
Sample
25cdad297bcf059ab13729025486295c_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
25cdad297bcf059ab13729025486295c_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
25cdad297bcf059ab13729025486295c_JaffaCakes118
-
Size
103KB
-
MD5
25cdad297bcf059ab13729025486295c
-
SHA1
6ff25fd11167e09011acdd4843a5ddee86c886c4
-
SHA256
44d03a04d78e498741cbdb5013f8deaf2b87469ef4c4baf6241217f64e4de239
-
SHA512
4b1e9e1b27e6596cdf5cd9f9dae20d0eec814451ae71ec66e54d9ceb74374c16d59c3a8302e6df15bdfa4e9865649d53cb3ba58a7527e0db526c68ff7ef2dcb2
-
SSDEEP
1536:36wGOozyxfGTdROYKDReerm0RMDNSirzUKO4jV6EmOYiZE1x28Q:IJ2MdROJRvmbhP8iZE1xd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 25cdad297bcf059ab13729025486295c_JaffaCakes118
Files
-
25cdad297bcf059ab13729025486295c_JaffaCakes118.exe windows:5 windows x86 arch:x86
8b936923ec01c744993c97bd81ab2097
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
RectVisible
GetPixel
LineTo
SelectObject
DeleteDC
SetMapMode
SetStretchBltMode
CreatePalette
GetTextMetricsA
CreateSolidBrush
GetStockObject
GetObjectA
CreateFontIndirectA
GetClipBox
RestoreDC
SetTextAlign
SaveDC
SelectPalette
DeleteObject
GetDeviceCaps
SetTextColor
CreateCompatibleDC
kernel32
GetWindowsDirectoryA
lstrlenA
GetModuleHandleA
lstrcmpiW
RemoveDirectoryA
lstrcmpiA
lstrcmpA
DeleteFileA
lstrlenW
QueryPerformanceCounter
RemoveDirectoryW
FindClose
GetSystemTime
GetCommandLineA
VirtualAlloc
CopyFileA
VirtualFree
GlobalFindAtomA
user32
CharNextA
GetParent
TranslateMessage
GetSystemMetrics
GetDC
GetDesktopWindow
glu32
gluNurbsCallback
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ