P:\GomK\vznXenLfDEPq4\JMkZheE\srfwyce.vwb
Static task
static1
Behavioral task
behavioral1
Sample
40eccfaedf876a1d18e6165c98186c49_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
40eccfaedf876a1d18e6165c98186c49_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
40eccfaedf876a1d18e6165c98186c49_JaffaCakes118
-
Size
86KB
-
MD5
40eccfaedf876a1d18e6165c98186c49
-
SHA1
f2c30314029e48d66f876b8957c3dd6e1b23b323
-
SHA256
44aeb756ea732002781453b535647082b6b9fdb26c8d727fc5fcb92ea25e2f6d
-
SHA512
83764ad2a8495dd700d9947828c29024f7b696edb9097fcdcf76af14dae35434bf44839f5a3cf452d40acc7e982f2c09d246888f66a363fb68ae2195c023b67c
-
SSDEEP
1536:5CNF+lnNptRNOoALhaAPzr2VyucHVEf+zylLcUWhMkjw7Seu6/vSDTyBKgU:c6NptRNDYF7rencyhc5OkjBeu6nWTyL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40eccfaedf876a1d18e6165c98186c49_JaffaCakes118
Files
-
40eccfaedf876a1d18e6165c98186c49_JaffaCakes118.exe windows:5 windows x86 arch:x86
84164121d4e4c24e5df0fa7adaacb3c5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
ChrCmpIW
ord158
PathMakePrettyW
StrCpyNW
StrCatW
StrStrA
PathCompactPathExA
StrCmpNIW
PathFindNextComponentW
kernel32
CancelWaitableTimer
OpenSemaphoreA
lstrcmpiA
SetMailslotInfo
CreateHardLinkA
GetSystemTimeAdjustment
GetModuleHandleA
SetupComm
GetCommModemStatus
SetInformationJobObject
GlobalCompact
SetMessageWaitingIndicator
IsBadWritePtr
SetTapePosition
LoadLibraryA
GetModuleHandleExA
LoadLibraryExW
user32
CopyImage
PostMessageW
InvalidateRgn
GetClipboardOwner
CreateCursor
DrawIcon
GetClientRect
GetWindowTextLengthA
SetWinEventHook
SetRect
EnableMenuItem
SystemParametersInfoA
MapWindowPoints
GetDialogBaseUnits
gdi32
CreateFontIndirectW
GetDIBits
GetRgnBox
CreatePatternBrush
GetTextCharset
CreateEnhMetaFileW
GetEnhMetaFileBits
SetBkColor
SetArcDirection
PlayEnhMetaFileRecord
SetViewportExtEx
msvcrt
memset
Exports
Exports
?_ChildWindowFromPoint@@YGKPAD0@Z
?_ChildWindowFromPointEx@@YGKPAD0PAG@Z
?_WindowFromPhysicalPoint@@YGPAXPAKPAEPAI@Z
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.icode Size: 1024B - Virtual size: 643B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.m_data Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CData Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
NData Size: 1024B - Virtual size: 532B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 776B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ