e:\xqq\j
Static task
static1
Behavioral task
behavioral1
Sample
40a3d4310ec1d5b165ebbf9e666beba1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
40a3d4310ec1d5b165ebbf9e666beba1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
40a3d4310ec1d5b165ebbf9e666beba1_JaffaCakes118
-
Size
517KB
-
MD5
40a3d4310ec1d5b165ebbf9e666beba1
-
SHA1
6c82088fdaf6b2db7b0a221c253268a93ef25ee6
-
SHA256
c83fa3facb54febe553aca85414d42cf8cd65e766f81726180953c4d429dfa46
-
SHA512
f0a492362fea5e090d5b0bd717620d20c0bb3f3bd79601e9593865fbfb288c46e770dce3b0836f602bc679c0019cd78c61976a15ca4445c85e76dc073df7d3af
-
SSDEEP
12288:Hln/DAZZlb/2iZCYjK0CiPLnDMmwI+7mjoxc8WL7qjSIObCmUMlU:HlncAOA7hmLIJObRUMlU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40a3d4310ec1d5b165ebbf9e666beba1_JaffaCakes118
Files
-
40a3d4310ec1d5b165ebbf9e666beba1_JaffaCakes118.exe windows:4 windows x86 arch:x86
d223c5e65764b10d90565cac6eec2f08
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
GetSaveFileNameA
GetSaveFileNameW
gdi32
gdiPlaySpoolStream
GetTextFaceW
CreateDIBPatternBrush
GetGlyphOutline
PaintRgn
GetEnhMetaFileDescriptionA
SaveDC
PolyDraw
EnumFontsW
BeginPath
CreateDIBPatternBrushPt
PolyPolygon
Arc
CreateEllipticRgnIndirect
EndDoc
PolyPolyline
GetEnhMetaFileDescriptionW
RemoveFontResourceA
GetPaletteEntries
SetFontEnumeration
Pie
SetPixel
GetROP2
SetICMProfileW
GetNearestColor
comctl32
InitCommonControlsEx
wininet
InternetQueryOptionA
InternetCreateUrlW
FtpRenameFileW
DeleteIE3Cache
FindNextUrlCacheEntryExW
InternetGetCookieA
InternetAttemptConnect
user32
TabbedTextOutW
GetMenuBarInfo
GetClassLongA
EnumWindows
RegisterClassA
CreateWindowExW
MessageBoxW
ShowWindow
GetPropA
IsMenu
LoadStringA
CallMsgFilter
GetAltTabInfo
SetClassWord
RegisterClassExA
MessageBoxA
DdeCmpStringHandles
ChangeDisplaySettingsExW
DdeFreeDataHandle
GetMenuItemInfoW
AttachThreadInput
ScrollDC
GetMenuStringW
InSendMessageEx
CreateDesktopW
CharPrevW
TrackPopupMenuEx
shell32
SHGetPathFromIDList
SHAppBarMessage
ExtractIconA
kernel32
GetCurrentProcessId
InitializeCriticalSection
lstrcmpW
lstrcpyW
ReleaseMutex
GetModuleFileNameW
WideCharToMultiByte
CreateMutexW
HeapFree
CreateMutexA
LCMapStringW
SetFilePointer
EnterCriticalSection
GetTickCount
GetStringTypeA
GetCurrentThread
GetModuleFileNameA
TlsSetValue
GetStringTypeW
TlsAlloc
GlobalDeleteAtom
CloseHandle
SetStdHandle
InterlockedDecrement
GetModuleHandleA
GetSystemTime
CompareStringA
GetEnvironmentStringsW
CreateDirectoryW
TerminateProcess
FreeEnvironmentStringsW
GetLocalTime
TlsGetValue
GetCommandLineW
TlsFree
VirtualQuery
InterlockedExchange
ExitProcess
QueryPerformanceCounter
SetHandleCount
VirtualAlloc
MultiByteToWideChar
VirtualFree
GetFileType
GetLastError
SetLastError
GetStartupInfoA
HeapDestroy
FreeEnvironmentStringsA
SetConsoleCursorPosition
RtlUnwind
FillConsoleOutputAttribute
HeapReAlloc
SetEnvironmentVariableA
GetTimeZoneInformation
GetStdHandle
LCMapStringA
InterlockedIncrement
GetProcAddress
GetStartupInfoW
ReadFile
LeaveCriticalSection
UnhandledExceptionFilter
GetStringTypeExW
GetEnvironmentStrings
GetCurrentProcess
LoadLibraryA
CompareStringW
GetCurrentThreadId
GetSystemTimeAsFileTime
WriteFile
GetVersion
HeapCreate
FlushFileBuffers
GetCommandLineA
DeleteCriticalSection
IsBadWritePtr
GetCPInfo
HeapAlloc
OpenMutexA
Sections
.text Size: 322KB - Virtual size: 322KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 66KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ