Static task
static1
Behavioral task
behavioral1
Sample
025e47fe6631b0d91126917718569da6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
025e47fe6631b0d91126917718569da6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
025e47fe6631b0d91126917718569da6_JaffaCakes118
-
Size
176KB
-
MD5
025e47fe6631b0d91126917718569da6
-
SHA1
9918aff99eb39a85b8d1aab2ff5913c2f218aca2
-
SHA256
e4c22cbd1004244533983e39758129916dae21b849df3377d013153f0a260cd5
-
SHA512
3c06f03910f1b07c140415aa707e8d0f0925f21db4401cb72a545fe15c25b1b180b0c73d84fc100a01e2d552e67a3206aa68dc8a98230637c0ec92a7dbae52fe
-
SSDEEP
3072:UfDQT+7Vhf3NpYt1tWkNNFHKr1WWiJfhf3NpYt1tWkNNFHKr1WWiJ:Iy+5hPkT0kNaihPkT0kNa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 025e47fe6631b0d91126917718569da6_JaffaCakes118
Files
-
025e47fe6631b0d91126917718569da6_JaffaCakes118.exe windows:4 windows x86 arch:x86
e699ac72ba1a3bf7bf594d622a59d3d1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CopyEnhMetaFileA
GetObjectA
SetPixel
SetBkMode
LineTo
CreateDIBitmap
GetDIBColorTable
GetBitmapBits
BitBlt
CreateCompatibleBitmap
advapi32
RegDeleteValueA
kernel32
CloseHandle
lstrcpynA
ExitProcess
MoveFileA
SizeofResource
GetOEMCP
VirtualAllocEx
HeapAlloc
GetStringTypeA
GetModuleHandleA
GetCurrentThreadId
LoadLibraryA
LoadLibraryExA
FormatMessageA
GetCurrentProcessId
GetCurrentProcess
VirtualAlloc
VirtualQuery
WriteFile
ExitThread
GlobalAddAtomA
comctl32
ImageList_Create
ImageList_GetBkColor
ImageList_DragShowNolock
ImageList_Add
ImageList_Draw
ImageList_Destroy
ImageList_Remove
ImageList_Read
ImageList_Write
ImageList_DrawEx
version
VerFindFileA
VerQueryValueA
shell32
Shell_NotifyIconA
SHGetDesktopFolder
user32
GetDesktopWindow
GetClientRect
EnableScrollBar
GetDCEx
GetLastActivePopup
CharToOemA
BeginPaint
ShowWindow
GetActiveWindow
CreatePopupMenu
CallWindowProcA
GetForegroundWindow
SetTimer
CharLowerBuffA
DispatchMessageW
IsWindowEnabled
EqualRect
DefWindowProcA
MessageBoxA
GetCapture
DispatchMessageA
GetWindow
DrawFrameControl
CheckMenuItem
CharLowerA
GetSysColor
DrawEdge
DefFrameProcA
DefMDIChildProcA
CreateWindowExA
GetMessagePos
DrawIcon
GetMenuState
GetClipboardData
FrameRect
EnableWindow
BeginDeferWindowPos
GetMenuItemInfoA
SetWindowPos
CallNextHookEx
GetCursor
GetDC
RegisterClassA
EnumChildWindows
SetCursor
ShowScrollBar
FillRect
EndDeferWindowPos
CharNextA
IsChild
DrawIconEx
GetMenuStringA
GetSysColorBrush
SetWindowLongA
GetKeyNameTextA
CreateIcon
EndPaint
HideCaret
GetDlgItem
EnumThreadWindows
GetMenuItemCount
ClientToScreen
DeferWindowPos
DrawMenuBar
DrawTextA
TrackPopupMenu
IsMenu
GetMenuItemID
IsWindowVisible
IsDialogMessageA
GetCursorPos
GetClassLongA
GetMenu
GetIconInfo
GetSubMenu
GetScrollPos
GetFocus
GetScrollRange
GetParent
GetWindowTextA
GetKeyState
GetPropA
SystemParametersInfoA
EnumWindows
GetScrollInfo
CreateMenu
FindWindowA
SetWindowTextA
EnableMenuItem
msvcrt
swprintf
fabs
tolower
log
malloc
wcscspn
strlen
cos
log10
memmove
ceil
calloc
Sections
CODE Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 1024B - Virtual size: 838B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE