Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_40c10e9a5efc140494d3e28f435f09bf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_40c10e9a5efc140494d3e28f435f09bf.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_40c10e9a5efc140494d3e28f435f09bf
-
Size
99KB
-
MD5
40c10e9a5efc140494d3e28f435f09bf
-
SHA1
6717a7b2d45590e08aa8486ee30efa7ea31b1e7c
-
SHA256
c2bcac81bf82cc56f9c632d07fb9af4efcbad8c405d01dbbd9539adb4be93c08
-
SHA512
49e0456005f7d3d780717b35300cf641dbecdde34ae96bb5a382dabefc33f7c0fb575827761ebe057f7660d7f2024836838ed6b648f48b87955b436611038bef
-
SSDEEP
3072:7cRXfqZ3UXuImw8EUvvDRjmoc49sEv3U:7cqkXRmvzJFc4OEf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_40c10e9a5efc140494d3e28f435f09bf
Files
-
JaffaCakes118_40c10e9a5efc140494d3e28f435f09bf.exe windows:4 windows x86 arch:x86
a45a4d9f36aa0b8ddff6d3b6aafb470f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_stricmp
fread
_write
_adjust_fdiv
strlen
_initterm
_exit
wcslen
free
realloc
strstr
_except_handler3
__setusermatherr
_acmdln
__p__fmode
__set_app_type
__getmainargs
__p__commode
sprintf
strchr
calloc
kernel32
GlobalLock
lstrcatA
GetStartupInfoA
CreateDirectoryA
GetStringTypeExA
SetFileAttributesW
SetErrorMode
GetUserDefaultLangID
FreeLibrary
GetProcAddress
LoadLibraryExW
InterlockedIncrement
GetACP
GetStringTypeA
GetThreadLocale
IsDebuggerPresent
WriteFile
ReadFile
DeleteFileW
GetModuleFileNameW
TerminateProcess
oleaut32
SetErrorInfo
VariantInit
SafeArrayGetUBound
VariantCopy
LoadTypeLib
SysFreeString
SafeArrayCreate
CreateErrorInfo
SysAllocStringByteLen
GetErrorInfo
SafeArrayPutElement
SysReAllocStringLen
comctl32
ImageList_SetBkColor
ImageList_Remove
ImageList_Read
CreatePropertySheetPageA
PropertySheetA
ImageList_DragLeave
ImageList_GetImageInfo
CreateStatusWindowA
advapi32
FreeSid
RegCreateKeyExA
OpenProcessToken
RegQueryValueA
RegEnumKeyW
RegDeleteValueA
RegCreateKeyExW
RegCreateKeyA
RegSetValueExW
OpenServiceA
GetUserNameA
RegQueryValueExW
RegEnumKeyExA
user32
RemovePropA
BeginPaint
EnableWindow
GetSystemMenu
DestroyCursor
CreateMenu
GetKeyboardType
DeleteMenu
DrawIconEx
EndPaint
gdi32
GetBkColor
EnumFontsA
CreatePenIndirect
GetTextAlign
GetMetaFileBitsEx
CreateRectRgn
CreateICA
GetObjectW
CreateFontIndirectA
ole32
CLSIDFromProgID
CreateItemMoniker
IsAccelerator
CoFreeUnusedLibraries
CoSetProxyBlanket
ProgIDFromCLSID
CoInitializeSecurity
OleSetClipboard
GetRunningObjectTable
Sections
.text Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ