Static task
static1
Behavioral task
behavioral1
Sample
fb55bfb77b6af7318d79ed7bfbdc4f5a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb55bfb77b6af7318d79ed7bfbdc4f5a_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
fb55bfb77b6af7318d79ed7bfbdc4f5a_JaffaCakes118
-
Size
457KB
-
MD5
fb55bfb77b6af7318d79ed7bfbdc4f5a
-
SHA1
bb719dbf6ebaa4264031f55268c711f104e43ca6
-
SHA256
15d05582814f64b8bdbfa3d0324892647beb7a73c5926681ee8b43663841ce9c
-
SHA512
ef5e9675ef33e733a9327137f93b3e0520e3044aaf0ea6da84314615aa5a8d855f98c043d06363a4ac5e3ef748ab9e185b3905e668e14301caeb758b44d7d4fc
-
SSDEEP
12288:ccnbNniZPRkYcfByGOXg1dxH8lH/vDPnBdHIgrd:cANnSPRkXrxdclH3DPBFIgrd
Malware Config
Signatures
Files
-
fb55bfb77b6af7318d79ed7bfbdc4f5a_JaffaCakes118.exe windows:4 windows x86 arch:x86
f7afea8e716a1cf335443b175183e9cd
Code Sign
c6:c3:e0:4d:41:36:62:1e:d2:e1:29:a2:41:db:bd:f0:68:80:2b:72Signer
Actual PE Digestc6:c3:e0:4d:41:36:62:1e:d2:e1:29:a2:41:db:bd:f0:68:80:2b:72Digest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
wininet
HttpEndRequestA
kernel32
VirtualAlloc
CreateFileA
GetModuleHandleW
LockResource
WriteFile
GetLastError
CreateFileMappingA
CloseHandle
FreeLibrary
FindResourceA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
GetCommandLineA
GetTickCount
SetEndOfFile
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapAlloc
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
ExitProcess
GetVersion
GetSystemTimeAsFileTime
GetCommandLineW
GetVersionExA
ReadFile
lstrcmpiA
SetFilePointer
TerminateProcess
HeapFree
GetStartupInfoA
GetProcAddress
CreateThread
GetModuleHandleA
user32
GetSystemMetrics
RegisterClassW
MessageBoxA
GetDC
GetCapture
CreateDialogParamA
CreateWindowExA
GetWindowThreadProcessId
IntersectRect
GetClassInfoA
GetSystemMenu
GetWindowLongA
InvalidateRect
IsChild
IsDialogMessageA
IsIconic
IsRectEmpty
IsWindow
RemovePropA
SetMenu
CharNextA
LoadStringA
GetClientRect
gdi32
DeleteObject
ExcludeClipRect
GetClipBox
CreatePenIndirect
CreatePen
GetDeviceCaps
Rectangle
comdlg32
ChooseFontA
FindTextW
GetSaveFileNameA
GetOpenFileNameA
advapi32
RegCreateKeyExA
RegCloseKey
shell32
StrStrIA
ole32
CoTaskMemAlloc
oleaut32
SafeArrayGetElement
VarDecRound
VarRound
VarNumFromParseNum
SafeArrayPutElement
SafeArrayGetUBound
SafeArrayRedim
SafeArrayGetLBound
Sections
.text Size: 408KB - Virtual size: 404KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.Cdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ