Static task
static1
Behavioral task
behavioral1
Sample
40f43acd2423f5e1faba3a94a04a8ea9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
40f43acd2423f5e1faba3a94a04a8ea9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
40f43acd2423f5e1faba3a94a04a8ea9_JaffaCakes118
-
Size
276KB
-
MD5
40f43acd2423f5e1faba3a94a04a8ea9
-
SHA1
1da88bfc565973dc090110a6ee16b4f965f03736
-
SHA256
89a147643a50bf850b7988a8430c0505dc1e2bb90938281afd9cc4801fc4a61f
-
SHA512
4d3bb5e33aa5ce0168086d19f7568ed8aef6bdd640690f82a73e69a06b1c6710d7cd02139275e25ece56eec398da3c818637c9dedc309cff832a00c826ce1790
-
SSDEEP
6144:jS/8blfrNe/m98ixGx1TDnhpzKrHnbGiVyZF3/CAWEeWp:jS/8btrisYTDnh9K8WP0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40f43acd2423f5e1faba3a94a04a8ea9_JaffaCakes118
Files
-
40f43acd2423f5e1faba3a94a04a8ea9_JaffaCakes118.exe windows:4 windows x86 arch:x86
41d29e2cbf9a957289b64789f79c1a0e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ConnectNamedPipe
lstrlenA
OutputDebugStringA
IsBadWritePtr
IsBadStringPtrA
IsBadReadPtr
GetVersionExA
GetTickCount
GetSystemInfo
GetStartupInfoA
GetLocalTime
GetHandleInformation
GetFileTime
GetFileSize
GetCurrentThreadId
GetComputerNameA
GetCommandLineA
GetACP
FreeLibrary
LoadLibraryA
lstrcpynA
lstrcmpiA
lstrcmpA
lstrcpyA
lstrcatA
SetEnvironmentVariableA
FreeEnvironmentStringsA
GetEnvironmentStrings
SetTimeZoneInformation
GetTimeZoneInformation
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InterlockedCompareExchange
InterlockedIncrement
GlobalUnlock
SetEvent
GlobalReAlloc
ExitThread
ExitProcess
CreateThread
GlobalFindAtomA
GlobalDeleteAtom
GlobalAddAtomA
DeleteAtom
AddAtomA
GetWindowsDirectoryA
DeleteFileA
SetFilePointer
FlushFileBuffers
CloseHandle
CreateFileA
CopyFileA
WaitForSingleObjectEx
WaitForSingleObject
SetThreadPriority
ResetEvent
OpenEventA
MoveFileA
HeapReAlloc
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
GetCurrentProcessId
GetModuleHandleA
GetSystemTimeAdjustment
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
VirtualAlloc
GetOEMCP
GetCPInfo
DisconnectNamedPipe
CreateEventA
CreateNamedPipeA
WaitForMultipleObjects
GetOverlappedResult
ReadFile
GetLastError
WriteFile
HeapFree
GetProcessHeap
GlobalLock
HeapAlloc
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetProcAddress
GetVersion
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
GetStringTypeW
user32
KillTimer
MessageBoxA
SetTimer
wsprintfA
GetParent
GetWindowTextLengthA
advapi32
FreeSid
GetLengthSid
GetTokenInformation
InitializeSecurityDescriptor
RegCloseKey
RegCreateKeyExA
RegEnumValueA
RegQueryValueExA
RegOpenKeyA
RegNotifyChangeKeyValue
AllocateAndInitializeSid
shell32
CommandLineToArgvW
ole32
CoUninitialize
CoInitialize
OleRun
CoGetMalloc
Sections
.code Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 244KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE