Static task
static1
Behavioral task
behavioral1
Sample
25ee79754f240b92b067a1acff4e084e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25ee79754f240b92b067a1acff4e084e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
25ee79754f240b92b067a1acff4e084e_JaffaCakes118
-
Size
50KB
-
MD5
25ee79754f240b92b067a1acff4e084e
-
SHA1
1f7b4d9f63e02d6a0192db8b6672478446318af0
-
SHA256
e5f1d6897264e7813661e60656c09a9becf380c9f8d91f31c9e1cbc69b913c81
-
SHA512
c54a562e9e3974804aca5381eb882bb0335dcad9b9ab5e12a3d6698d15a8c441fdb1dd632f8c98c83e632f776dbf09fad8b04d01b0db013f9be47e1c69f787a8
-
SSDEEP
768:GkpLA8BtBV0QJcW5wqInmNSfyvwx+BKXCJW+trdvsWCJn66kvOR:fkQJcqwmIfj+ECJG/kvO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 25ee79754f240b92b067a1acff4e084e_JaffaCakes118
Files
-
25ee79754f240b92b067a1acff4e084e_JaffaCakes118.exe .vbs windows:4 windows x86 arch:x86 polyglot
1a4792e8364b5ca91b4b517978fb32ff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryA
MoveFileExA
DeleteFileA
WinExec
GetTempFileNameA
GetTempPathA
ReadFile
SetFilePointer
lstrcpynA
CreateDirectoryA
FindNextFileA
ReleaseMutex
WaitForSingleObject
lstrcmpiA
lstrcpyA
lstrcmpA
GetEnvironmentVariableA
lstrcatA
GetDiskFreeSpaceA
GetProcAddress
GetModuleHandleA
Sleep
MoveFileA
GetCurrentProcess
FormatMessageA
GetLastError
GetComputerNameA
SetCurrentDirectoryA
GetSystemTime
LoadLibraryA
GetLocalTime
FindFirstFileA
VirtualAlloc
FileTimeToDosDateTime
SetEndOfFile
DosDateTimeToFileTime
GetFileTime
SetFileTime
ExitProcess
ReleaseSemaphore
OpenSemaphoreA
CreateMutexA
GetWindowsDirectoryA
SystemTimeToFileTime
CreateProcessA
CreateSemaphoreA
CreateThread
DeviceIoControl
HeapFree
HeapAlloc
GetProcessHeap
GetDriveTypeA
GetLogicalDrives
GetLogicalDriveStringsA
SizeofResource
LockResource
LoadResource
FindResourceA
FileTimeToSystemTime
GetCurrentProcessId
TerminateProcess
OpenProcess
FindClose
lstrlenA
MultiByteToWideChar
SetFileAttributesW
CreateFileA
GetFileSize
CloseHandle
CreateFileMappingA
MapViewOfFile
WriteFile
UnmapViewOfFile
GetModuleFileNameA
CopyFileA
VirtualFree
SetFileAttributesA
user32
CharLowerBuffA
wsprintfA
DefWindowProcA
SetTimer
ShowWindow
PostQuitMessage
EndDialog
KillTimer
DialogBoxParamA
advapi32
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetFileSecurityA
InitializeSecurityDescriptor
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegSaveKeyA
RegOpenKeyExA
RegRestoreKeyA
RegCloseKey
RegQueryValueExA
LookupAccountNameA
shell32
SHChangeNotify
ole32
CoInitialize
CoUninitialize
msvcrt
__CxxFrameHandler
_stricmp
_strcmpi
isdigit
memmove
strchr
wcslen
strncmp
strrchr
atoi
_strlwr
strncpy
_findfirst
_findnext
_findclose
psapi
EnumProcessModules
GetModuleFileNameExA
ws2_32
gethostbyname
WSAStartup
WSACleanup
inet_addr
Sections
.data Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qyejeuz Size: 4KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
acxghzk Size: 4KB - Virtual size: 76KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE