Static task
static1
Behavioral task
behavioral1
Sample
40e371f97124875c84c045e7be1d8528_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
40e371f97124875c84c045e7be1d8528_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
40e371f97124875c84c045e7be1d8528_JaffaCakes118
-
Size
208KB
-
MD5
40e371f97124875c84c045e7be1d8528
-
SHA1
9289b960f64d3e1993d575c7185aba8848d76297
-
SHA256
e31bc7e75ff37472fe87201784398108dcc8563ad056fb23093fdd265980adf5
-
SHA512
51bcc30cbaccd04c0164f47e1cb7289a25377f7f97abfc04f68e2304f20e844f5e30d38d1523554b17f606aecc3eef0bcdf97604a89c6c5a697d391d1a0d89da
-
SSDEEP
3072:hLLFp/ljbCjrL0oNa/rInoUtq1cGZuqMbxTxKI0oWSLvBSq2R7XIbHmSDZX:tnlqj30oAzUtq1cGsN0ILYqw7X7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40e371f97124875c84c045e7be1d8528_JaffaCakes118
Files
-
40e371f97124875c84c045e7be1d8528_JaffaCakes118.exe windows:4 windows x86 arch:x86
6ae75b121d33383f73885b13d1fec55d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHDeleteValueA
PathGetCharTypeA
PathIsContentTypeA
SHQueryInfoKeyA
SHEnumValueA
SHDeleteKeyA
msvcrt
memset
srand
pow
strcmp
comdlg32
ChooseColorA
GetSaveFileNameA
FindTextA
GetOpenFileNameA
GetFileTitleA
user32
RegisterWindowMessageA
RedrawWindow
MessageBoxA
PeekMessageW
PostMessageA
LoadIconA
OffsetRect
PostQuitMessage
PeekMessageA
ReleaseCapture
RemovePropA
LoadStringA
RemoveMenu
SetActiveWindow
SendMessageA
LoadBitmapA
RegisterClassA
PtInRect
MapVirtualKeyA
ReleaseDC
LoadCursorA
MessageBeep
RegisterClipboardFormatA
LoadKeyboardLayoutA
MapWindowPoints
OemToCharA
OpenClipboard
ScrollWindow
SendMessageW
ScreenToClient
gdi32
CreateFontIndirectA
CreatePenIndirect
CreateDIBitmap
SetPixel
SetTextColor
CreatePalette
CreateCompatibleBitmap
GetBitmapBits
oleaut32
RegisterTypeLib
GetErrorInfo
version
GetFileVersionInfoSizeA
kernel32
VirtualQuery
lstrcmpiA
lstrcpynA
ExitThread
GetVersionExA
lstrcmpA
VirtualAllocEx
IsBadReadPtr
WriteFile
WideCharToMultiByte
MulDiv
LocalFree
lstrcpyA
VirtualFree
lstrlenA
MoveFileA
SizeofResource
LocalReAlloc
lstrlenW
lstrcatA
GetModuleHandleW
LoadLibraryA
VirtualAlloc
WaitForSingleObject
GetModuleHandleA
ExitProcess
LocalAlloc
MoveFileExA
GetProcAddress
HeapDestroy
comctl32
ImageList_Write
ImageList_DragShowNolock
ImageList_Add
ImageList_Draw
ole32
CLSIDFromString
WriteClassStm
PropVariantClear
shell32
SHGetSpecialFolderLocation
SHFileOperationA
SHGetDiskFreeSpaceA
Sections
.text Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 649B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc9 Size: 512B - Virtual size: 414B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc5 Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc2 Size: 1024B - Virtual size: 675B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc8 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc6 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ