Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20240802-en
General
-
Target
bdd0ea3c337895cc4b3ed3526df5334c_JaffaCakes118
-
Size
3.6MB
-
MD5
bdd0ea3c337895cc4b3ed3526df5334c
-
SHA1
e1c70d78a368f052de2b99b2fb395a2c297e2784
-
SHA256
34416989d7edb137ff220d406db6d82186150771f0e9f4efa815eed7a2ef51fc
-
SHA512
eafd89c3297f30acec3fb2b68ead2df5202948c70a3526eb822012d01adb34b84456bc71039b6230af435b29856430ffa84560f8a4d0b3ffded185360e94eb66
-
SSDEEP
98304:IyWVV0Dze1ycwC5hu0GKbtU+DlqkqD/2wxpUnh486V:ghkC12+Dlqk0Tpch48I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/setup.exe
Files
-
bdd0ea3c337895cc4b3ed3526df5334c_JaffaCakes118.zip
-
changes.txt
-
readme.txt
-
setup.exe.exe windows:4 windows x86 arch:x86
d221b1dc8c3a08622f6512e7876527c8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WriteFile
CreateDirectoryA
lstrcpyA
CreateFileA
GetFileAttributesA
lstrlenA
GetTempPathA
lstrcmpA
lstrcatA
ExitProcess
DeleteFileA
FreeLibrary
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetFileSize
GetLastError
CreateMutexA
GetModuleFileNameA
VirtualAlloc
VirtualFree
GetStartupInfoA
user32
MessageBoxA
wsprintfA
msvcrt
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gentee Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ