Static task
static1
Behavioral task
behavioral1
Sample
40b999ee0e944448a92c579e861ca149_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
40b999ee0e944448a92c579e861ca149_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
40b999ee0e944448a92c579e861ca149_JaffaCakes118
-
Size
152KB
-
MD5
40b999ee0e944448a92c579e861ca149
-
SHA1
ae548ff7b0d898bba8b52af088550a4b20adedf6
-
SHA256
6730c301939b2e6bfcf1871012bdc0a0f404073b3e39f8066ebfac410bd14c32
-
SHA512
17ff73cc8e0f3f9b1c0797b07d2cc8259c43566ba79faeeec6654c7f47d2ee89ba859b01e9b1e02246f90aedbaa3671971923490b2f455a910562abdb9edd8ac
-
SSDEEP
3072:nMy55HT3+S7oKZI4ptVmzMRDzNXleD5vQ7UjsvIoF/TN/S:ruMoKzptszsD6D5Y7rRx/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40b999ee0e944448a92c579e861ca149_JaffaCakes118
Files
-
40b999ee0e944448a92c579e861ca149_JaffaCakes118.exe windows:4 windows x86 arch:x86
b5f720642e2c60365eedf7385f7e2bdd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenMutexA
GetExitCodeProcess
Sleep
TerminateProcess
FindClose
FindFirstFileA
GetCurrentDirectoryA
GetModuleFileNameA
SetEndOfFile
CompareStringW
CompareStringA
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetStdHandle
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
SetFilePointer
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
CreateMutexA
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
CreateEventA
WaitForSingleObject
WaitForMultipleObjectsEx
CreateThread
GetCurrentThread
SetEnvironmentVariableA
MulDiv
LocalAlloc
WriteFile
ReadFile
GetFileSize
CreateFileA
ResetEvent
GetCurrentProcess
DuplicateHandle
GetLastError
OutputDebugStringA
SuspendThread
CreateProcessA
ResumeThread
WriteProcessMemory
OpenProcess
GetEnvironmentVariableA
RtlUnwind
HeapSize
CloseHandle
HeapReAlloc
GetVersion
GetCommandLineA
FormatMessageA
VirtualAlloc
LocalFree
ReadProcessMemory
SetCurrentDirectoryA
DeleteFileA
SetFileAttributesA
FindNextFileA
MoveFileA
RemoveDirectoryA
GetProcAddress
FreeLibrary
LoadLibraryA
HeapFree
HeapAlloc
ExitProcess
GetModuleHandleA
GetStartupInfoA
user32
SetForegroundWindow
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
UpdateWindow
PeekMessageA
TranslateMessage
DispatchMessageA
BeginPaint
EndPaint
DefWindowProcA
GetClientRect
SetWindowTextA
MessageBeep
GetWindowRect
SendMessageTimeoutA
IsWindowVisible
ShowWindow
PostMessageA
BringWindowToTop
AdjustWindowRectEx
IsIconic
SystemParametersInfoA
MoveWindow
MessageBoxA
GetTabbedTextExtentA
GetDC
ReleaseDC
GetDesktopWindow
GetActiveWindow
wsprintfA
GetForegroundWindow
GetWindowThreadProcessId
GetWindowLongA
EnumThreadWindows
EnumWindows
gdi32
GetObjectA
BitBlt
CreateCompatibleDC
DeleteDC
CreateSolidBrush
CreatePen
Rectangle
SetBkMode
LPtoDP
SetTextColor
TextOutA
CreateFontA
SelectObject
DeleteObject
CreateDIBSection
advapi32
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptImportKey
CryptVerifySignatureA
CryptDestroyKey
CryptDestroyHash
CryptReleaseContext
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
winmm
timeGetTime
raw_005.wdt
?EnableActivityTracker@@YA_N_N@Z
?IsActivityTrackerEnabled@@YA_NXZ
?ResetActivityCheck@@YAXXZ
?HasBeenActivitySinceLastReset@@YA_NXZ
imagehlp
UnMapAndLoad
MapAndLoad
comctl32
_TrackMouseEvent
Sections
.text Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 24KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.FFF Size: 256B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE