Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f40cfabc0994f6fd8fcfee5a447fc4e8.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f40cfabc0994f6fd8fcfee5a447fc4e8.exe
Resource
win10v2004-20250211-en
General
-
Target
JaffaCakes118_f40cfabc0994f6fd8fcfee5a447fc4e8
-
Size
279KB
-
MD5
f40cfabc0994f6fd8fcfee5a447fc4e8
-
SHA1
4588a38af64bc66b14ccdbac44f3f0f9d4fa1096
-
SHA256
4a11090a846898bb9212cb9dcef8456d65c2a56630140eebcb37da9fbc62d547
-
SHA512
1e17c976a1669a05c6f3cc249c162a1b23a94af3ea817a3ed589bfdfe85bf8de433e6a4257e5d101d0771cfbe8e82ffae5692022344f28a355f0121b266e8b4f
-
SSDEEP
6144:FddU78SO6oy0BPuu+R2vQDGwhXtfAyKllZkpT:FXizZ0BPqD1XWZk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_f40cfabc0994f6fd8fcfee5a447fc4e8
Files
-
JaffaCakes118_f40cfabc0994f6fd8fcfee5a447fc4e8.exe windows:4 windows x86 arch:x86
4c0b8be7ea5d44097f271fe2d47e1709
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
Polygon
CreatePen
GetObjectW
SetROP2
SelectObject
GetStockObject
CreateFontIndirectW
GetClipRgn
ExtTextOutW
PtInRegion
CreateSolidBrush
DeleteDC
SetBkMode
SetTextColor
GetObjectType
DeleteObject
SetBkColor
BitBlt
CreateCompatibleDC
RoundRect
SelectClipRgn
SetTextAlign
CombineRgn
TextOutW
SetViewportOrgEx
GetTextMetricsW
CreateRectRgn
CreateCompatibleBitmap
GetTextExtentPoint32W
GetBkColor
GetTextExtentExPointW
ExtCreatePen
CreateRectRgnIndirect
shlwapi
ColorAdjustLuma
StrChrW
kernel32
LoadResource
lstrcpyW
lstrcpynW
GetLongPathNameW
GlobalFree
GlobalAlloc
lstrcmpiW
HeapSize
OpenEventW
FindResourceExW
IsDebuggerPresent
GlobalUnlock
FatalAppExitW
LockResource
OutputDebugStringA
lstrcpynA
SetLastError
GetModuleHandleA
FindClose
LocalFree
IsProcessorFeaturePresent
WideCharToMultiByte
DeleteCriticalSection
GetACP
VirtualFree
LeaveCriticalSection
VirtualAlloc
GlobalLock
GetProcessHeap
FindNextFileW
LocalAlloc
SetUnhandledExceptionFilter
lstrcmpW
DeleteFileW
lstrlenW
HeapFree
FindResourceW
FindFirstFileW
HeapDestroy
WaitForSingleObject
SizeofResource
GetSystemTimeAsFileTime
HeapAlloc
CloseHandle
RaiseException
GetThreadLocale
GetModuleHandleW
FreeLibrary
HeapReAlloc
EnterCriticalSection
CreateThread
GetCurrentThreadId
UnhandledExceptionFilter
FlushInstructionCache
FormatMessageW
GetLocalTime
userenv
UnloadUserProfile
oleaut32
SafeArrayRedim
SysStringByteLen
VarBstrCmp
DispCallFunc
SafeArrayUnlock
SafeArrayCreate
SafeArrayCopy
SafeArrayGetLBound
SysStringLen
SysFreeString
SafeArrayDestroy
VariantCopyInd
LoadRegTypeLi
SafeArrayUnaccessData
SafeArrayLock
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayGetVartype
VariantInit
LoadTypeLi
VariantClear
SysAllocStringByteLen
SysAllocString
shell32
SHGetMalloc
SHGetFolderLocation
DragQueryFileW
SHGetPathFromIDListW
ShellExecuteExW
SHGetDesktopFolder
user32
CreateWindowExW
GetClassNameW
GetDC
GetWindowTextW
GetWindowDC
DefWindowProcW
InvalidateRect
IsWindowEnabled
DrawFocusRect
DestroyWindow
IsWindow
MessageBoxW
SetForegroundWindow
DestroyIcon
OffsetRect
GetWindowLongW
ShowWindow
EmptyClipboard
GetSystemMetrics
SetFocus
CallNextHookEx
SetTimer
MapDialogRect
GetWindow
SetWindowPlacement
BeginPaint
PtInRect
GetKeyState
SetClipboardData
GetFocus
GetNextDlgTabItem
DrawTextW
GetClientRect
SetCapture
DialogBoxParamW
SendMessageW
CloseClipboard
CallWindowProcW
GetCapture
GetGUIThreadInfo
IsRectEmpty
EndPaint
RedrawWindow
GetActiveWindow
GetWindowPlacement
GetSysColor
GetWindowRect
InsertMenuW
GetTabbedTextExtentW
SetCursor
CopyRect
SetRectEmpty
GetDlgItem
SystemParametersInfoW
UnhookWindowsHookEx
SetWindowTextW
SetWindowPos
KillTimer
IsCharAlphaNumericW
SetWindowLongW
RegisterClipboardFormatW
GetWindowTextLengthW
PostMessageW
EndDialog
GetDlgCtrlID
ScreenToClient
ReleaseDC
LoadImageW
MoveWindow
DrawStateW
GetWindowThreadProcessId
ReleaseCapture
SetWindowsHookExW
UnregisterClassA
OpenClipboard
GetCursorPos
MapWindowPoints
LoadCursorW
DrawIconEx
InflateRect
GetParent
GetTopWindow
TabbedTextOutW
SetDlgItemTextW
ole32
CoGetObject
CreateStreamOnHGlobal
CoCreateInstance
ReleaseStgMedium
StringFromGUID2
advapi32
RegDeleteKeyW
GetSidSubAuthority
OpenThreadToken
RevertToSelf
EqualSid
CopySid
InitializeSid
RegCreateKeyExW
ImpersonateSelf
GetSidSubAuthorityCount
RegSetValueExW
RegDeleteValueW
GetLengthSid
RegCloseKey
GetSidLengthRequired
GetTokenInformation
IsValidSid
RegOpenKeyExW
RegQueryValueExW
msimg32
GradientFill
esent
JetCreateTable
JetGetTableColumnInfo
JetBeginExternalBackup
JetCloseDatabase
JetGetTableInfo
JetRetrieveTaggedColumnList
JetCreateTableColumnIndex2
JetOpenDatabase
JetReadFileInstance
JetRestore2
JetSetCurrentIndex3
wship6
WSHJoinLeaf
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 246KB - Virtual size: 266KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 7KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ