Static task
static1
Behavioral task
behavioral1
Sample
25abe61e95b344c5975d72807d8e4c67_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
25abe61e95b344c5975d72807d8e4c67_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
25abe61e95b344c5975d72807d8e4c67_JaffaCakes118
-
Size
526KB
-
MD5
25abe61e95b344c5975d72807d8e4c67
-
SHA1
34b8d4ee0c8105e676adb50018e481f8451f56bc
-
SHA256
3a4ba78dfbefcbe0661b9665104be2f6ca139c13e32e12967294377f96d68946
-
SHA512
e0f0e5ce9cf60aeda096551e2f2c30c39c2eda3e61bdaaa2ee04764fbf6bff91cf8d68311c2b9e9edb0c188945b02f93eb7b3b96f676b2cb84afe1275ba66e95
-
SSDEEP
12288:soGaBEhWW0E+lU385H+edBdI4qDnojmh+6FRPC+1Bg:OBUE+uSHLdBdcDIg+6FpPBg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 25abe61e95b344c5975d72807d8e4c67_JaffaCakes118
Files
-
25abe61e95b344c5975d72807d8e4c67_JaffaCakes118.exe windows:4 windows x86 arch:x86
2facc447db58db980427034ff1982e20
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DisableThreadLibraryCalls
EnumResourceLanguagesA
ExitProcess
FlushFileBuffers
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetStartupInfoA
HeapAlloc
LeaveCriticalSection
LoadResource
OpenFile
SetCurrentDirectoryA
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
lstrcatA
lstrcpyA
lstrcpynA
lstrlenA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
ntdll
NtQuerySymbolicLinkObject
NtQueryValueKey
NtSetValueKey
NtUnmapViewOfSection
NtWriteVirtualMemory
RtlAllocateAndInitializeSid
RtlAnsiStringToUnicodeString
RtlCharToInteger
RtlCopyLuid
RtlCopyUnicodeString
RtlCreateSecurityDescriptor
RtlCreateTagHeap
RtlCreateUnicodeString
RtlCreateUserThread
RtlEqualSid
RtlExpandEnvironmentStrings_U
RtlFreeUnicodeString
RtlInitializeCriticalSectionAndSpinCount
RtlLeaveCriticalSection
RtlNtStatusToDosError
RtlPrefixUnicodeString
RtlSetDaclSecurityDescriptor
NtQueryObject
RtlUpcaseUnicodeChar
strstr
swprintf
wcscat
wcscpy
wcslen
NtCreateEvent
NtCreateSection
NtCreateSymbolicLinkObject
NtDuplicateObject
NtMakeTemporaryObject
NtMapViewOfSection
NtNotifyChangeKey
NtOpenKey
NtQueryDefaultLocale
NtQueryInformationProcess
RtlUnlockHeap
rpcrt4
RpcBindingSetAuthInfoExA
RpcBindingSetObject
RpcEpRegisterA
RpcBindingSetAuthInfoA
RpcMgmtEnableIdleCleanup
RpcMgmtEpEltInqNextA
RpcMgmtInqIfIds
RpcMgmtInqStats
RpcMgmtSetAuthorizationFn
RpcNetworkInqProtseqsA
RpcProtseqVectorFreeA
RpcServerInqBindings
RpcServerRegisterAuthInfoA
RpcServerRegisterIfEx
RpcServerUseAllProtseqsEx
RpcServerUseProtseqEpExA
RpcServerUseProtseqExA
RpcSmClientFree
RpcSmEnableAllocate
RpcSsAllocate
RpcSsDestroyClientContext
RpcSsDisableAllocate
RpcSsFree
UuidCreate
UuidCreateSequential
UuidToStringA
data_into_ndr
double_array_from_ndr
long_from_ndr_temp
short_array_from_ndr
short_from_ndr_temp
tree_peek_ndr
RpcBindingServerFromClient
RpcBindingInqOption
RpcBindingInqObject
MesInqProcEncodingId
MesHandleFree
MesEncodeDynBufferHandleCreate
MesDecodeIncrementalHandleCreate
MIDL_wchar_strcpy
IUnknown_QueryInterface_Proxy
CStdStubBuffer_QueryInterface
RpcEpUnregister
crtdll
wcschr
strcmp
setbuf
memchr
isleadbyte
fsetpos
_wcsicoll
_sopen
_mbctombb
_getdllprocaddr
_exit
_execve
_chdrive
_beep
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ