Static task
static1
Behavioral task
behavioral1
Sample
40e78cbb236c1c425b6e370efa40ee3e_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
40e78cbb236c1c425b6e370efa40ee3e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
40e78cbb236c1c425b6e370efa40ee3e_JaffaCakes118
-
Size
498KB
-
MD5
40e78cbb236c1c425b6e370efa40ee3e
-
SHA1
f7daa482ae0a4b5b135b26ef6821267105e38c04
-
SHA256
e7c721d8a16ff5fce35d5ceb033d6f5c25693d61e007bbda01aeb08cf47bb8e3
-
SHA512
3cef4e04548d38b07092a2cf96e3a25a09925f4fefe5e08c68bb2823915839206dfc64aa6d79d52effc8cfefab890eaef15260390b0d854bbcd1a123dddfac60
-
SSDEEP
12288:RoKI7iTxrm62ZLryShL+P9mlVv92TnAU3:Ro9eFDMrn+P9mlXU3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40e78cbb236c1c425b6e370efa40ee3e_JaffaCakes118
Files
-
40e78cbb236c1c425b6e370efa40ee3e_JaffaCakes118.exe windows:5 windows x86 arch:x86
7b6bc622abbe7460f7e1d2144ef4f807
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42u
ord2438
ord2116
ord5273
ord4621
ord4419
ord768
ord489
ord4253
ord2350
ord2293
ord2362
ord4704
ord5949
ord3092
ord860
ord2606
ord4197
ord6279
ord6278
ord4272
ord4124
ord2755
ord926
ord5679
ord6219
ord4198
ord927
ord2910
ord6920
ord656
ord4229
ord4370
ord941
ord3067
ord6051
ord1768
ord5286
ord4831
ord3397
ord3716
ord567
ord795
ord2567
ord4390
ord3569
ord609
ord3605
ord641
ord616
ord2294
ord6195
ord5257
ord3871
ord5276
ord3592
ord324
ord5977
ord4847
ord6024
ord2859
ord2403
ord2015
ord4213
ord2570
ord4392
ord3577
ord2574
ord4396
ord3365
ord3635
ord693
ord3993
ord3694
ord6898
ord6193
ord5845
ord3296
ord817
ord565
ord1166
ord6896
ord6211
ord2638
ord4279
ord3991
ord4270
ord3133
ord2371
ord2078
ord6237
ord940
ord269
ord826
ord600
ord1571
ord1250
ord1248
ord1563
ord1194
ord1240
ord342
ord1179
ord1570
ord1568
ord1173
ord1115
ord1720
ord5059
ord3744
ord6372
ord2047
ord2640
ord4435
ord4829
ord3793
ord5283
ord4347
ord6370
ord5157
ord2377
ord5237
ord4401
ord1767
ord4073
ord6048
ord2506
ord4992
ord4848
ord4371
ord5261
ord4352
ord4942
ord4970
ord4736
ord4899
ord5154
ord5156
ord5155
ord1899
ord1128
ord2717
ord3948
ord1165
ord815
ord561
ord3733
ord4418
ord4616
ord4075
ord3074
ord3820
ord3826
ord3825
ord3396
ord2971
ord3076
ord2980
ord3257
ord3131
ord4459
ord3254
ord3142
ord2977
ord5710
ord5285
ord5303
ord4692
ord4074
ord5298
ord5296
ord3341
ord2388
ord5193
ord1089
ord3917
ord5727
ord2504
ord2546
ord4480
ord6371
ord922
ord4199
ord2810
ord858
ord538
ord861
ord942
ord1143
ord1634
ord3566
ord2406
ord3621
ord924
ord3658
ord535
ord823
ord825
ord6466
ord540
ord4155
ord2634
ord800
msvcrt
wcslen
__CxxFrameHandler
free
malloc
wcscpy
_wcsicmp
_purecall
__RTDynamicCast
wcscmp
swscanf
wcschr
wcsrchr
wcsstr
_wcsnicmp
_initterm
_adjust_fdiv
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__dllonexit
_onexit
_except_handler3
msvcp60
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
atl
ord15
ord22
ord18
ord21
ord16
ord32
advapi32
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
FreeSid
LookupAccountSidW
RegDeleteValueW
RegOpenKeyW
RegEnumKeyW
RegEnumKeyExW
RegDeleteKeyW
LookupAccountNameW
kernel32
GetCurrentThreadId
lstrlenW
InterlockedDecrement
GetModuleHandleW
GetModuleFileNameW
GetLastError
CloseHandle
GlobalAlloc
GlobalFree
InitializeCriticalSection
InterlockedIncrement
lstrcmpiW
SetLastError
lstrcpyW
CreateDirectoryW
ExpandEnvironmentStringsW
GetSystemTimeAsFileTime
LocalFree
LocalAlloc
WritePrivateProfileStringW
WritePrivateProfileSectionW
GetPrivateProfileSectionW
GetPrivateProfileStringW
GetPrivateProfileSectionNamesW
WriteFile
CreateFileW
GetFileAttributesExW
GetModuleHandleA
GetProcAddress
LoadLibraryW
OutputDebugStringA
LoadLibraryA
FormatMessageW
GlobalUnlock
GlobalLock
DeleteCriticalSection
mpr
WNetGetUniversalNameW
ole32
CoInitialize
StringFromGUID2
CoGetMalloc
StringFromCLSID
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CreateStreamOnHGlobal
ReleaseStgMedium
oleaut32
SysAllocString
SysFreeString
VariantClear
VariantInit
shell32
SHGetMalloc
SHBrowseForFolderW
SHGetPathFromIDListW
user32
LoadBitmapW
LoadStringW
SetCursor
LoadCursorW
wsprintfW
EnableWindow
SendMessageW
wvsprintfW
MessageBoxW
RegisterClipboardFormatW
SetWindowsHookExW
CallNextHookEx
UnhookWindowsHookEx
MessageBeep
SetParent
ScreenToClient
GetParent
IsWindowVisible
GetWindowRect
GetClientRect
WinHelpW
shlwapi
PathCompactPathW
PathIsUNCW
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 344B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0x0x4 Size: 2KB - Virtual size: 72B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 2KB - Virtual size: 13B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: 2KB - Virtual size: 911B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ik Size: 2KB - Virtual size: 79B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ocode Size: 2KB - Virtual size: 158B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kpack0 Size: 428KB - Virtual size: 427KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gddg8 Size: 2KB - Virtual size: 356B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.iaoq Size: 2KB - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.oxcodex Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0x0x1 Size: 2KB - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0x0x2 Size: 2KB - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0x0x Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0x0x3 Size: 2KB - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0x0x5 Size: 2KB - Virtual size: 6B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0x0x6 Size: 2KB - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0x0x7 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CRT Size: 2KB - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 290B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ