Static task
static1
Behavioral task
behavioral1
Sample
06f807bdeb1e6e4e946b459898cde1ee_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
06f807bdeb1e6e4e946b459898cde1ee_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
06f807bdeb1e6e4e946b459898cde1ee_JaffaCakes118
-
Size
457KB
-
MD5
06f807bdeb1e6e4e946b459898cde1ee
-
SHA1
d212b8e4f3b16de218f07ad696bc09157c355b17
-
SHA256
9a5328e1b53fe99bfb9f4fe000874a862e4c010c7bd56974421c2ebf31e0c414
-
SHA512
496f72251b75c1707f8cb63659c2d8c5cb7b9ec7292e9a9f27e62cf8599249f50d6116ab7dd80e128c4b490ba15b0274e6b51bb2552cfdb53c6648ada2ed76b1
-
SSDEEP
12288:n9xxJqCZIeT8Iq75133vUjtcv/vKwCJgra:nzPIeTE338JcvKwCJgra
Malware Config
Signatures
Files
-
06f807bdeb1e6e4e946b459898cde1ee_JaffaCakes118.exe windows:4 windows x86 arch:x86
cbc6a3658c96dbbc89afa11394eb6ef9
Code Sign
c7:3c:e9:48:6d:be:ec:65:07:d0:e8:54:98:65:66:40:45:f2:3d:eaSigner
Actual PE Digestc7:3c:e9:48:6d:be:ec:65:07:d0:e8:54:98:65:66:40:45:f2:3d:eaDigest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
version
VerQueryValueW
kernel32
LockResource
GetDefaultCommConfigA
ExitProcess
VirtualAlloc
ReadFile
GetModuleHandleW
GetLastError
CreateFileMappingA
CloseHandle
FreeResource
FreeLibrary
FindResourceA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
SetErrorMode
QueryPerformanceCounter
LCMapStringA
GetStringTypeW
GetStringTypeA
GetTickCount
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapAlloc
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
SetFilePointer
HeapFree
GetVersion
GetSystemTimeAsFileTime
GetCommandLineW
GetStartupInfoA
GetModuleHandleA
GetCommandLineA
GetProcAddress
GetVersionExA
CreateThread
GetUserDefaultLangID
WriteFile
LCMapStringW
MultiByteToWideChar
user32
GetSystemMetrics
GetDC
GetWindowLongA
GetSystemMenu
GetClassInfoA
GetCapture
IntersectRect
GetWindowThreadProcessId
InvalidateRect
IsDialogMessageA
IsIconic
IsRectEmpty
IsWindow
RemovePropA
SetMenu
SetMenuItemInfoA
SetPropA
SetRect
SetScrollInfo
GetWindowPlacement
GetWindowRect
GetClassNameA
GetKeyboardType
GetScrollPos
PtInRect
LoadStringA
GetClientRect
DialogBoxParamA
RegisterClassExA
CreateWindowExA
CreateDialogParamA
MessageBoxA
IsChild
gdi32
GetDeviceCaps
SetBkColor
TextOutW
CreatePen
CreatePenIndirect
ExcludeClipRect
Rectangle
GetClipBox
advapi32
RegSetValueExW
RegCreateKeyExA
AllocateLocallyUniqueId
RegCloseKey
GetUserNameA
oleaut32
SafeArrayGetUBound
SafeArrayRedim
SafeArrayGetLBound
SafeArrayGetElement
SafeArrayCreate
SysAllocStringLen
SysReAllocStringLen
SafeArrayPutElement
Sections
.text Size: 404KB - Virtual size: 402KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ