Static task
static1
Behavioral task
behavioral1
Sample
c25f8002f54e8101d1eab3d210e1ebaf_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c25f8002f54e8101d1eab3d210e1ebaf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c25f8002f54e8101d1eab3d210e1ebaf_JaffaCakes118
-
Size
108KB
-
MD5
c25f8002f54e8101d1eab3d210e1ebaf
-
SHA1
01e501582915836f292d30c9ea127c8ebef12a4b
-
SHA256
c15ec8dfd03feca31f59fd28253c47ba1a52c3b8c90201309749b202410a3c37
-
SHA512
49fc369c2ffa960711c60a2771d8f9ed93e1c26ce13ca251521b2980530571a337356c55201cc54d467490d00c94331808640f73fd48daa0b7cea0b7a0b9c1ca
-
SSDEEP
1536:Iv7PrhZYSOgoPGPZSj9cRk2GrXOqynZjqg6Smz2DTFemzoL6EjNtaOWAujXn:ITzYeZSj9cPuXOZaSmz0pzWaOWAk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c25f8002f54e8101d1eab3d210e1ebaf_JaffaCakes118
Files
-
c25f8002f54e8101d1eab3d210e1ebaf_JaffaCakes118.exe windows:4 windows x86 arch:x86
789ce14a068670ec6ba10339282258ec
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDeviceCaps
CreateSolidBrush
SetTextAlign
SetStretchBltMode
GetTextMetricsA
SaveDC
GetPixel
DeleteDC
RestoreDC
CreateCompatibleDC
SelectObject
DeleteObject
CreatePalette
GetObjectA
RectVisible
GetStockObject
CreateFontIndirectA
SelectPalette
SetMapMode
SetTextColor
user32
CharNextA
GetParent
TranslateMessage
GetSystemMetrics
GetDC
GetDesktopWindow
kernel32
GetWindowsDirectoryA
lstrlenW
lstrcmpiW
GetCommandLineA
GetModuleHandleA
GlobalFindAtomA
RemoveDirectoryA
GetSystemTime
QueryPerformanceCounter
CopyFileA
lstrcmpiA
lstrlenA
RemoveDirectoryW
FindClose
lstrcmpA
VirtualAlloc
VirtualFree
glu32
gluNurbsCallback
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE