Static task
static1
Behavioral task
behavioral1
Sample
ad925f3f09a949002213092a28f66073_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ad925f3f09a949002213092a28f66073_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ad925f3f09a949002213092a28f66073_JaffaCakes118
-
Size
257KB
-
MD5
ad925f3f09a949002213092a28f66073
-
SHA1
7996b4c2b25b87ec9aa763c169fd4d0be5ea59fe
-
SHA256
9e87730f99a2f6789ce3f6a904ee137174a0dab6afc4a2248ff182be77d4c7e4
-
SHA512
6d6e509950bb6221ed5db51e1d6a88584a209aee566af211de3c619f085df2ecc96bc9864a16bbbe3b27d34978dead64d66fb2e6b45c207613d65b337e0b979d
-
SSDEEP
3072:ricFgFSqXNa0s3o2MV2SwcfjUGkmj1AWFhGIhtrJG+2ozcQU8gh1yhw7yds5VLGM:6XNNSo2EscAxmpDGIhtrTpUpH15WJS3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad925f3f09a949002213092a28f66073_JaffaCakes118
Files
-
ad925f3f09a949002213092a28f66073_JaffaCakes118.exe windows:4 windows x86 arch:x86
7af25957aac184cede8a4d48ab7d2464
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetLastError
GetTickCount
GetCurrentProcess
MultiByteToWideChar
GetSystemDirectoryW
GetVersionExA
GetProcessHeap
GetStartupInfoW
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsAlloc
GetCurrentThreadId
HeapCreate
ExitProcess
GetModuleFileNameA
GetEnvironmentStringsW
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
Sleep
GetLocaleInfoA
InitializeCriticalSection
LoadLibraryA
CreateMutexA
GetProcAddress
user32
GetSystemMetrics
SetTimer
LoadCursorA
LoadMenuIndirectA
SetWindowTextW
GetDlgItemTextW
keybd_event
WaitMessage
ActivateKeyboardLayout
EndMenu
MoveWindow
MonitorFromRect
GetDlgItemInt
LoadCursorW
InsertMenuA
MessageBeep
GetMenu
SetWindowPos
GetKeyboardLayout
LoadMenuA
GetDesktopWindow
EnableMenuItem
LoadBitmapA
CharUpperW
SetWindowLongW
CharNextW
RegisterClassExA
CreateDesktopW
SetFocus
DialogBoxIndirectParamA
RegisterClassExW
MonitorFromWindow
GetCapture
IsDlgButtonChecked
GetClassInfoW
wsprintfA
RegisterClassW
TrackPopupMenuEx
MessageBoxA
GetCursorPos
MonitorFromPoint
CharLowerA
AdjustWindowRect
CreateDialogIndirectParamW
GetIconInfo
UnregisterClassW
GetKeyboardType
GetCaretPos
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegDeleteKeyW
CloseServiceHandle
StartServiceW
OpenServiceW
OpenSCManagerW
usp10
ScriptGetGlyphABCWidth
ScriptStringFree
ScriptShape
ScriptGetLogicalWidths
ScriptItemize
ScriptCacheGetHeight
gdi32
AddFontResourceW
GetStockObject
CreateFontIndirectExW
CreateScalableFontResourceW
CreateICW
CreateCompatibleDC
GetMetaFileA
GetEnhMetaFilePixelFormat
CreateMetaFileW
CreateSolidBrush
RemoveFontResourceExA
CreateBrushIndirect
rasppp
RasCpEnumProtocolIds
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 1KB - Virtual size: 477KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 109KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 109KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ