Static task
static1
Behavioral task
behavioral1
Sample
40d47f14d586c1768134f8bd63d2b65c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
40d47f14d586c1768134f8bd63d2b65c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
40d47f14d586c1768134f8bd63d2b65c_JaffaCakes118
-
Size
60KB
-
MD5
40d47f14d586c1768134f8bd63d2b65c
-
SHA1
4e0a78b60ea652bd5a432e1325f2ad99daf41cc8
-
SHA256
7349f661e945472a523305ec72c2512bb17b36f178343c265d05ff297bc4b4b8
-
SHA512
d97c704f8c9e254a8de14efa07d7f508ac7fd0456056fe1162f9d9a9ecf455542df00312a3b1435f811909da99b8b9187997e2ee3c5c72f565eaf1865b7890d1
-
SSDEEP
768:HdrKIAEh6YkHsHjoUgHrZd+Y82UD11nfXduM2BpfeYf2Rw7AZXoKFcn:HdrKo6YkHsMr2ZD1FfXJ2He+AoKFcn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40d47f14d586c1768134f8bd63d2b65c_JaffaCakes118
Files
-
40d47f14d586c1768134f8bd63d2b65c_JaffaCakes118.exe windows:4 windows x86 arch:x86
4b163dc1e35b66382a4c51778b907c88
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
LocalFileTimeToFileTime
SystemTimeToFileTime
GetLastError
MoveFileA
RtlUnwind
RaiseException
CloseHandle
GetFileType
CreateFileA
FindFirstFileA
FindNextFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
ExitProcess
TerminateProcess
GetCurrentProcess
GetCommandLineA
GetVersion
WriteFile
ReadFile
SetFilePointer
SetHandleCount
GetStdHandle
GetStartupInfoA
SetStdHandle
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapFree
SetUnhandledExceptionFilter
HeapAlloc
SetEndOfFile
GetCPInfo
GetACP
GetOEMCP
SetFileTime
HeapSize
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
FlushFileBuffers
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
VirtualAlloc
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetProcAddress
LoadLibraryA
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetFileInformationByHandle
PeekNamedPipe
GetFileAttributesA
CreateDirectoryA
GetDriveTypeA
RemoveDirectoryA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetFullPathNameA
Sections
.text Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ