Static task
static1
Behavioral task
behavioral1
Sample
40f69ac4f39c6fdb36d2796bcf58169c_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
40f69ac4f39c6fdb36d2796bcf58169c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
40f69ac4f39c6fdb36d2796bcf58169c_JaffaCakes118
-
Size
121KB
-
MD5
40f69ac4f39c6fdb36d2796bcf58169c
-
SHA1
146f4e7c0da9e6d0ce33ab643f6cd369018f435c
-
SHA256
b0c6bda3c91f81a694540b2d9ee7385202eb82be5c7b2cbc6ddec22355ea7252
-
SHA512
df4c5e641f15dc3c60af3d3450de4147c4bb83dedc677b269236da0ec6d02e39cb7de4e1d075926100e695d43c6edfc3f55aecfc6156858fa30f269c835c972b
-
SSDEEP
3072:72c+NPgVpHBnwbZjQlNf7supkGlypL+vCsBs4osr9q7:7bb6buTplyIqiMsBq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40f69ac4f39c6fdb36d2796bcf58169c_JaffaCakes118
Files
-
40f69ac4f39c6fdb36d2796bcf58169c_JaffaCakes118.exe windows:4 windows x86 arch:x86
650e562f3aa3a8dec159017db5d2cbd2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadCursorA
PeekMessageW
ReleaseDC
MessageBeep
ScreenToClient
OemToCharA
PostQuitMessage
SetActiveWindow
LoadIconA
PtInRect
RegisterWindowMessageA
LoadBitmapA
PostMessageA
OpenClipboard
ScrollWindow
SendMessageA
LoadKeyboardLayoutA
MessageBoxA
SendMessageW
RedrawWindow
RemovePropA
LoadStringA
ReleaseCapture
MapVirtualKeyA
RemoveMenu
RegisterClassA
PeekMessageA
MapWindowPoints
RegisterClipboardFormatA
OffsetRect
kernel32
CompareStringA
ExitThread
lstrlenW
EnterCriticalSection
SetFilePointer
HeapDestroy
LocalReAlloc
GetOEMCP
ExitProcess
lstrcmpiA
GetDateFormatA
GetSystemDefaultLangID
IsBadHugeReadPtr
GetFullPathNameA
FreeLibrary
GetEnvironmentStrings
LoadLibraryExA
GetCPInfo
FindClose
LoadLibraryA
VirtualAllocEx
GetTickCount
FormatMessageA
WaitForSingleObject
GetUserDefaultLCID
lstrcatA
lstrlenA
CloseHandle
GetCommandLineW
SetThreadLocale
WideCharToMultiByte
SizeofResource
GetModuleHandleA
GetFileType
GetThreadLocale
GetFileSize
GlobalAddAtomA
GetVersion
GetLocalTime
SetHandleCount
FindResourceA
GetDiskFreeSpaceA
InitializeCriticalSection
GetCurrentThread
ReadFile
GetProcessHeap
GlobalFindAtomA
GetModuleHandleW
GetFileAttributesA
GlobalAlloc
GetCurrentProcessId
LoadResource
VirtualAlloc
GetLastError
GetCurrentProcess
GetVersionExA
lstrcmpA
GetACP
LocalFree
SetEvent
GetProcAddress
version
VerQueryValueA
advapi32
GetLengthSid
RegCreateKeyA
RegCreateKeyExA
gdi32
CreateCompatibleDC
LineTo
RestoreDC
GetDCOrgEx
CreatePalette
msvcrt
memmove
atol
Sections
CODE Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cdata Size: 1024B - Virtual size: 808B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ