Static task
static1
Behavioral task
behavioral1
Sample
25edf04994ee5110e265073635f40e7b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25edf04994ee5110e265073635f40e7b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
25edf04994ee5110e265073635f40e7b_JaffaCakes118
-
Size
65KB
-
MD5
25edf04994ee5110e265073635f40e7b
-
SHA1
2800e4bb5d7bd582375d798fd8e770875f0af51f
-
SHA256
77844b4f89e4f661988eaf2455dd23f55421093a0e1ac50fac3fbfe2047582f9
-
SHA512
cb02b7a05f80770738c99bfe461c6dcdfa8b229fe40f1b8089a6eeaafa9114d342797064573c4d488b04fb9552b3b3efa7834a9c8263a4dddfcc7b62b07ec6f1
-
SSDEEP
1536:egkkeZKyhH92mpeHEAg1LEtiPG3zVOjgdtXnl3:hkkeZJhHgEvMiOgjgd/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 25edf04994ee5110e265073635f40e7b_JaffaCakes118
Files
-
25edf04994ee5110e265073635f40e7b_JaffaCakes118.exe windows:5 windows x86 arch:x86
45b4ee65cb931b0b8de29c37a7ffcdad
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
SHFileOperationA
ShellExecuteA
SHGetSpecialFolderLocation
SHGetFileInfoA
advapi32
RegQueryValueExA
RegDeleteValueA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegDeleteKeyA
RegEnumValueA
RegEnumKeyA
RegCreateKeyExA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
kernel32
SetTimeZoneInformation
WriteFile
GetModuleHandleA
InterlockedExchange
GetThreadLocale
GetDiskFreeSpaceW
ReleaseSemaphore
CreateFileW
MapViewOfFile
FormatMessageA
SetHandleContext
SetInformationJobObject
GetTempFileNameW
GlobalMemoryStatusEx
GetStartupInfoA
GetStringTypeW
VirtualQuery
FreeLibrary
SetConsoleWindowInfo
GetProcessHeap
GetCurrentDirectoryW
WaitForSingleObject
CreateFileMappingA
LCMapStringW
GetStringTypeA
GetFileSize
SetFilePointer
CreateTimerQueue
ExitProcess
GetShortPathNameW
LCMapStringA
LocalFree
IsDebuggerPresent
CreateProcessW
CreateProcessA
HeapFree
GetLongPathNameW
HeapAlloc
FreeEnvironmentStringsW
ReadFile
CloseHandle
CreateFileA
LoadLibraryA
TermsrvAppInstallMode
GetTempPathA
SearchPathW
HeapReAlloc
GetTempPathW
GetCommandLineA
GetVersionExA
GetLogicalDriveStringsA
OpenThread
SetLastError
GetProcAddress
ole32
CreateDataAdviseHolder
CoQueryClientBlanket
CoLockObjectExternal
OleBuildVersion
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jtmfsx Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 129KB - Virtual size: 251KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ