Static task
static1
Behavioral task
behavioral1
Sample
b40388475a98c250b4b227a62bde362d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b40388475a98c250b4b227a62bde362d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b40388475a98c250b4b227a62bde362d_JaffaCakes118
-
Size
76KB
-
MD5
b40388475a98c250b4b227a62bde362d
-
SHA1
c7b69db452ccb1722cc96d3f68a374e75c3b23b1
-
SHA256
f1c7255c4f4b873120934daaff310b556f99bef6d945ad89f6392b26afeda56a
-
SHA512
9ed31e0e446342bb0a50620db2b256061d0d824182be0febc1d02dd7cbb1582e629633c43d939fe0d7c2d9340bb95af5f7dbd78d6d89d1204b34166340a74bee
-
SSDEEP
1536:i13WARxuEnhcsMTiCgdU7bVRRRRRRR0V8WIrfGIpayle9+8OFcIdz+z7uD8xFexI:i1GwhcsMOCgdU7bVRRRRRRR0V8vfG+aP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b40388475a98c250b4b227a62bde362d_JaffaCakes118
Files
-
b40388475a98c250b4b227a62bde362d_JaffaCakes118.exe windows:5 windows x86 arch:x86
2cff3a977631918f772dfca33c8d205b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalReAlloc
MultiByteToWideChar
Sleep
OpenEventW
SetLocalTime
SetThreadPriorityBoost
LockFileEx
CreateSemaphoreW
LocalAlloc
CopyFileW
CreateMutexW
CreateDirectoryW
GetPrivateProfileIntW
GetCurrentProcess
GetVolumeInformationW
GetSystemDirectoryW
GetFullPathNameW
GetCommandLineW
QueryDosDeviceW
SetFileTime
LocalFree
WideCharToMultiByte
GetDriveTypeW
lstrcmpW
IsBadStringPtrA
lstrlenW
ReleaseMutex
InterlockedIncrement
GetPrivateProfileStringW
DeleteFileW
GetModuleHandleA
FormatMessageW
SetCurrentDirectoryW
FormatMessageA
IsValidLocale
FreeLibrary
OpenMutexW
lstrlenA
SetFilePointer
GetLastError
OpenFileMappingW
WriteProcessMemory
GetFileAttributesW
DisconnectNamedPipe
GetModuleFileNameW
WriteFile
GetLogicalDriveStringsW
GetDiskFreeSpaceExW
SetLastError
EnumDateFormatsW
ExpandEnvironmentStringsW
GetAtomNameA
GetDateFormatW
GetTempFileNameW
GetTimeFormatW
lstrcmpiW
GlobalAlloc
GetProcAddress
GetPrivateProfileSectionW
GetWindowsDirectoryW
InterlockedDecrement
GetProcessHeap
SuspendThread
RaiseException
FlushViewOfFile
DeviceIoControl
HeapReAlloc
HeapSize
GlobalFree
CloseHandle
GetOEMCP
FindResourceA
ole32
GetRunningObjectTable
CoCreateInstance
CoInitialize
CoUninitialize
CreateItemMoniker
CoTaskMemFree
gdi32
DeleteDC
SetViewportOrgEx
OffsetViewportOrgEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
GetStockObject
user32
IsDialogMessageW
SendMessageW
DestroyWindow
IsWindowVisible
LoadStringW
PostMessageW
GetWindowInfo
GetWindowLongW
CreateWindowExW
RegisterClassExW
IsHungAppWindow
advapi32
InitializeSecurityDescriptor
StartServiceW
SetEntriesInAclW
AllocateAndInitializeSid
OpenServiceW
GetUserNameW
CloseServiceHandle
SetSecurityDescriptorDacl
OpenSCManagerW
QueryServiceStatus
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.BSS Size: 46KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ