Static task
static1
Behavioral task
behavioral1
Sample
40896ac8d848019e72f0e2d89b646361_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
40896ac8d848019e72f0e2d89b646361_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
40896ac8d848019e72f0e2d89b646361_JaffaCakes118
-
Size
110KB
-
MD5
40896ac8d848019e72f0e2d89b646361
-
SHA1
9824c661d8842802afaa4afcf8758ccc2340deb4
-
SHA256
7833051b7841d7ebae64a818fde3658f19aac8375e70c368f16342933868dd0d
-
SHA512
9e763042d7283de7d4326d42abc52fc56178d301f4f0f3d1af96ebd6ac35b061837a5224d8d9af0d200343a1c335ff2176c0ddae1f78b6a12ee2eca2a2d5c0b9
-
SSDEEP
1536:tlHUIPrKJoS6ncQC9UWmZCv5MDYXBgVdWZYhSFj5xN2CQEcP/T6EFEcHDsJDl:thrXSQCAIjFbACQ3PHDsJDl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40896ac8d848019e72f0e2d89b646361_JaffaCakes118
Files
-
40896ac8d848019e72f0e2d89b646361_JaffaCakes118.exe windows:4 windows x86 arch:x86
faa18d070522bbe502b8f8bdf49c48e2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetTextAlign
GetObjectA
RectVisible
GetDeviceCaps
GetPixel
DeleteDC
GetClipBox
SelectObject
SaveDC
CreatePalette
CreateFontIndirectA
CreateSolidBrush
SelectPalette
SetStretchBltMode
GetStockObject
GetTextMetricsA
CreateCompatibleDC
RestoreDC
SetMapMode
SetTextColor
DeleteObject
user32
GetDesktopWindow
GetSystemMetrics
CharNextA
GetParent
TranslateMessage
GetDC
kernel32
lstrcmpiW
GetModuleHandleA
lstrlenA
CopyFileA
lstrlenW
GetCommandLineA
GetWindowsDirectoryA
lstrcmpA
DeleteFileA
RemoveDirectoryA
RemoveDirectoryW
FindClose
GetSystemTime
QueryPerformanceCounter
lstrcmpiA
GlobalFindAtomA
VirtualAlloc
VirtualFree
glu32
gluNurbsCallback
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ