Static task
static1
Behavioral task
behavioral1
Sample
40b416ce02dfe1d7f6bd96c1cbb34267_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
40b416ce02dfe1d7f6bd96c1cbb34267_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
40b416ce02dfe1d7f6bd96c1cbb34267_JaffaCakes118
-
Size
91KB
-
MD5
40b416ce02dfe1d7f6bd96c1cbb34267
-
SHA1
0df98deb40e7c87cb59d65e2472014b2703ff872
-
SHA256
8da1d4ff85b274570599c716607448fcf3cf904b968d3020c317b69759d569e4
-
SHA512
136422772a1401d507e7d25e3ef288cfbe5c955f37759a97ea1e7146be49ab96d853b1f44b16ac6ad0c216412341e22c904cdfe46d71fe15929fc6438e7ee5d6
-
SSDEEP
1536:FeAZLLL1GXAQ5k7aGSV4bgvGCMU9zkBVitnWyKp1tPhL0F:QQB7eefitnWyK7liF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40b416ce02dfe1d7f6bd96c1cbb34267_JaffaCakes118
Files
-
40b416ce02dfe1d7f6bd96c1cbb34267_JaffaCakes118.exe windows:5 windows x86 arch:x86
19b65035124e5fb920433d9dcef3ed22
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetFolderPathA
shlwapi
StrStrA
StrChrA
kernel32
lstrlenA
lstrcmpA
AllocConsole
GetStdHandle
WriteFile
WriteConsoleA
ReadFile
ReadConsoleA
MultiByteToWideChar
HeapFree
lstrcmpiA
WideCharToMultiByte
HeapAlloc
SetConsoleMode
GetConsoleMode
GetLastError
GetModuleFileNameA
GetTimeFormatA
Sleep
CloseHandle
SizeofResource
LockResource
LoadResource
lstrcpyA
SetFilePointer
CreateFileA
CreateDirectoryA
GetFileAttributesA
GetSystemDefaultLCID
GetModuleHandleA
ReadConsoleInputA
lstrcatA
ExitProcess
WaitForSingleObject
SetConsoleCursorPosition
FillConsoleOutputCharacterA
GetConsoleScreenBufferInfo
PeekNamedPipe
lstrlenW
CreateProcessA
DuplicateHandle
GetCurrentProcess
CreatePipe
GetVersion
GetExitCodeProcess
TerminateProcess
GetTickCount
CreateThread
SetCurrentDirectoryA
DeleteFileA
GetCurrentDirectoryA
FindResourceA
lstrcmpW
GetCommandLineA
GetFileSize
GetProcessHeap
RemoveDirectoryA
lstrcatW
GetTempPathA
user32
GetWindowRect
DialogBoxParamA
CharLowerA
IsCharAlphaNumericA
GetDesktopWindow
GetParent
CharToOemA
MessageBoxA
CopyRect
OffsetRect
SetWindowPos
LoadStringA
SetDlgItemTextA
GetDlgItem
SetFocus
GetDlgItemTextA
EndDialog
wsprintfA
GetForegroundWindow
advapi32
RegQueryValueExA
RegCloseKey
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExW
ole32
CoUninitialize
CoGetObject
CLSIDFromProgID
CoCreateInstance
CoInitialize
oleaut32
VariantTimeToSystemTime
VarBstrFromCy
VarBstrFromR4
VarBstrFromR8
VarBstrFromDec
SafeArrayUnaccessData
LoadTypeLi
SysFreeString
VariantInit
SysAllocString
DispInvoke
DispGetIDsOfNames
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
SysStringLen
SafeArrayAccessData
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ