Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_40db240005afbabaf4282e3d4ddc2337.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_40db240005afbabaf4282e3d4ddc2337.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_40db240005afbabaf4282e3d4ddc2337
-
Size
127KB
-
MD5
40db240005afbabaf4282e3d4ddc2337
-
SHA1
6d9eb03d7f2f3c6c28f828cee70ec66fe95a547b
-
SHA256
acb96068d52227dbee23c2fd88afdbfa106a2871907a10a7fed7aad56336ed3e
-
SHA512
1ab910a6eb6a389f96390f06be78bfed7bb8e707a9353dffb236ba0a35ffe67a2000a43e6aa7e2f8f8ccc60c6a5ab663688dfd1df9db8164a6a70356c41c6c9b
-
SSDEEP
3072:JEoRtKF5M/cILSgNLLqlJF6ilgJs/L7IP7JMKH1/kg6Y9t7rFf:CMtJd+gNLLqfF6UgnDJkQb7r
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_40db240005afbabaf4282e3d4ddc2337
Files
-
JaffaCakes118_40db240005afbabaf4282e3d4ddc2337.exe windows:4 windows x86 arch:x86
5cabd42df2b6aa57ce86fa54973305ee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetLocalTime
GetProcessTimes
OutputDebugStringA
GetCurrentProcess
GetProcAddress
FreeLibrary
GetDriveTypeA
GetTickCount
LocalHandle
EraseTape
GetProfileIntA
Sleep
PulseEvent
CreateWaitableTimerA
CommConfigDialogA
GetThreadLocale
VirtualProtect
DeleteFileA
LocalSize
GetLogicalDrives
CallNamedPipeA
GlobalUnfix
GlobalUnlock
MultiByteToWideChar
GlobalAlloc
SizeofResource
CloseHandle
WaitForMultipleObjects
WaitNamedPipeA
VirtualAlloc
GetEnvironmentStrings
IsBadWritePtr
FindClose
ReadProcessMemory
VirtualFreeEx
WaitForSingleObjectEx
IsBadReadPtr
WriteProcessMemory
CreateSemaphoreA
GetProcessHeap
GetWindowsDirectoryA
GetMailslotInfo
MoveFileA
MulDiv
IsBadCodePtr
DeviceIoControl
LockResource
GetFileInformationByHandle
PurgeComm
MoveFileExA
GetACP
CreateMailslotA
IsBadHugeWritePtr
GetPrivateProfileSectionA
SignalObjectAndWait
GlobalFindAtomA
DefineDosDeviceA
CreateConsoleScreenBuffer
GetUserDefaultLangID
WaitForMultipleObjectsEx
IsBadStringPtrA
GetOEMCP
VirtualFree
GetUserDefaultUILanguage
LoadLibraryExA
ClearCommBreak
FlushInstructionCache
VirtualQuery
GetConsoleCursorInfo
VirtualAllocEx
GetThreadPriority
GetPrivateProfileStringA
ReleaseSemaphore
GetLongPathNameA
FlushViewOfFile
DeleteAtom
WritePrivateProfileStructA
HeapValidate
ResetEvent
ContinueDebugEvent
LocalLock
ConnectNamedPipe
IsProcessorFeaturePresent
SetFilePointer
GetProcessVersion
FlushFileBuffers
PeekConsoleInputA
GetNamedPipeInfo
ReleaseMutex
OpenFileMappingA
PostQueuedCompletionStatus
MapViewOfFileEx
WriteFile
GetNamedPipeHandleStateA
LocalFree
GlobalFree
CreateDirectoryA
LocalAlloc
AreFileApisANSI
SetFileAttributesA
GetBinaryTypeA
GetDiskFreeSpaceA
LoadResource
QueryDosDeviceA
AllocConsole
VirtualProtectEx
FreeResource
GetExitCodeThread
CreateEventA
SearchPathA
ClearCommError
IsValidCodePage
LoadLibraryA
OpenMutexA
OpenProcess
GetStdHandle
GetCommandLineA
RemoveDirectoryA
GetFileTime
ResumeThread
ReadFile
GetVersion
FindNextChangeNotification
UpdateResourceA
GetModuleFileNameA
FindCloseChangeNotification
GetShortPathNameA
EndUpdateResourceA
GetHandleInformation
SetLastError
PeekNamedPipe
Beep
GetCPInfoExA
CancelWaitableTimer
GlobalReAlloc
CreateFileMappingA
VirtualQueryEx
VirtualUnlock
GetProcessWorkingSetSize
GetModuleHandleA
HeapDestroy
GetPrivateProfileStructA
GetProcessAffinityMask
GetThreadContext
HeapFree
GetSystemDefaultUILanguage
LocalFlags
DeleteFiber
GetProcessHeaps
MapViewOfFile
GetStartupInfoA
msvcrt
rand
time
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE