Static task
static1
Behavioral task
behavioral1
Sample
d40df538190fff2d655717e72d6307cc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d40df538190fff2d655717e72d6307cc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d40df538190fff2d655717e72d6307cc_JaffaCakes118
-
Size
2.4MB
-
MD5
d40df538190fff2d655717e72d6307cc
-
SHA1
a2457732df9a74335a9781d3edf9719501564a4a
-
SHA256
d3632b108c7880a2dba535c9aafd571fd3e731f585e97d00b8bf11196f390a08
-
SHA512
5c1ea1f3dc21f39a32317adedf14de95ca4c7d7579c2cfaa97bf6d6b719d63770e86de10bb9a84b075021a76aa7c800adeb80ae7627ed217375ac5cc7e8e2588
-
SSDEEP
24576:GfH06SUUxcGPbu5PLhGM+mm4zMqLe4xreYMtUrGQQjxY6ejRXwZGByzIkl3PMOhB:7zJ2/K4zY4xrzM+GQgyRSGB0Mi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d40df538190fff2d655717e72d6307cc_JaffaCakes118
Files
-
d40df538190fff2d655717e72d6307cc_JaffaCakes118.exe windows:5 windows x86 arch:x86
b4d532d5b19f0616b331179d851516e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetLastError
CloseHandle
GetSystemTimeAsFileTime
GetFullPathNameW
DeleteFileW
UnregisterWaitEx
QueryDepthSList
EncodePointer
DecodePointer
RtlUnwind
GetCommandLineW
RaiseException
IsProcessorFeaturePresent
SetLastError
GetCurrentThread
GetCurrentThreadId
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetModuleHandleW
CreateSemaphoreW
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
HeapFree
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
FreeLibrary
LoadLibraryExW
OutputDebugStringW
HeapReAlloc
GetStringTypeW
HeapSize
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
CreateFileW
DuplicateHandle
WaitForSingleObject
GetExitCodeThread
CreateThread
ExitThread
CreateTimerQueue
SetEvent
WaitForSingleObjectEx
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
GetVersionExW
VirtualFree
VirtualProtect
ReleaseSemaphore
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
LoadLibraryW
mpr
WNetGetConnectionW
WNetEnumResourceW
Sections
.text Size: 215KB - Virtual size: 214KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.410ay6 Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ