Static task
static1
Behavioral task
behavioral1
Sample
25fc9a86e03ff37e82dfe0146168433a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25fc9a86e03ff37e82dfe0146168433a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
25fc9a86e03ff37e82dfe0146168433a_JaffaCakes118
-
Size
121KB
-
MD5
25fc9a86e03ff37e82dfe0146168433a
-
SHA1
05abfd687b32d2ee90b1915bf29ed0cd2f6f68c9
-
SHA256
e0689b976ae00893d8621e33d4ca3be184c3ef14cecc1b5fd75ca27bce083bfd
-
SHA512
b7bd8d9cd45fa9c0b6381859615aaf4ab8d74bfc5e5ad8d129d447f11cb72467ca068e564e4c2488a5cff269c4991ac99cacf164e6f5e6071c14b240b558419e
-
SSDEEP
1536:6q+K/eDyDyZjj5InlElGddCifOw+kQGf676y7OSSovbl33+G/GE4:6hK/S+qLl6FJQO6+y7pSWl3TGE4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 25fc9a86e03ff37e82dfe0146168433a_JaffaCakes118
Files
-
25fc9a86e03ff37e82dfe0146168433a_JaffaCakes118.exe windows:4 windows x86 arch:x86
bdea1d619c0f5736281df2dfee8ebf3e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DefWindowProcA
SetWindowLongA
GetSysColor
GetClassLongA
GetActiveWindow
GetMenuItemCount
GetClientRect
GetScrollRange
ShowWindow
GetMenuStringA
GetFocus
GetDesktopWindow
GetPropA
kernel32
ExitThread
GetVersion
LoadLibraryExA
SizeofResource
Sleep
HeapFree
GetStdHandle
GlobalDeleteAtom
GetCurrentThreadId
GetEnvironmentStrings
InitializeCriticalSection
GetCPInfo
WriteFile
lstrcpynA
RaiseException
MoveFileExA
SetFilePointer
GetStringTypeW
GetOEMCP
GetCurrentProcess
FreeLibrary
CloseHandle
WaitForSingleObject
GetStartupInfoA
MoveFileA
GetTickCount
DeleteFileA
LockResource
GetACP
MulDiv
lstrcmpiA
GetFileSize
GetUserDefaultLCID
DeleteCriticalSection
SetErrorMode
FindClose
lstrcpyA
GetStringTypeA
GetFileType
FormatMessageA
GlobalAddAtomA
GetCurrentProcessId
GlobalFindAtomA
GetLastError
GetVersionExA
GetCurrentThread
EnterCriticalSection
LocalFree
ExitProcess
EnumCalendarInfoA
VirtualQuery
HeapDestroy
VirtualAllocEx
GetDateFormatA
SetThreadLocale
CreateThread
lstrcmpA
VirtualFree
CompareStringA
ReadFile
GetProcessHeap
CreateEventA
lstrlenA
WideCharToMultiByte
FindFirstFileA
lstrcatA
GetDiskFreeSpaceA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
GetThreadLocale
GetProcAddress
GetModuleHandleA
SetEvent
LoadResource
CreateFileA
LoadLibraryA
GetFileAttributesA
LocalAlloc
FreeResource
VirtualAlloc
GlobalAlloc
LocalReAlloc
FindResourceA
HeapAlloc
GetFullPathNameA
GetLocalTime
SetHandleCount
msvcrt
pow
strlen
calloc
_acmdln
tolower
log10
fabs
strcmp
memcpy
Sections
CODE Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 512B - Virtual size: 342B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE