Static task
static1
Behavioral task
behavioral1
Sample
3669e56e2f0048d117d86100d11c5d22_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3669e56e2f0048d117d86100d11c5d22_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
3669e56e2f0048d117d86100d11c5d22_JaffaCakes118
-
Size
457KB
-
MD5
3669e56e2f0048d117d86100d11c5d22
-
SHA1
882bb496f07b637281261767c0a103671b6d7205
-
SHA256
115f0266cf7c4d35213216ac0763909c7f6a77dd94533aaab3c26064b60eaa11
-
SHA512
5c07a76a4becf077fccabc65a3b2e821041d6e2308afcf5d6b51e139d0008d77757f00381b4269165270701f99de50a7378693aa3ab4b5b757bfd0745a198c74
-
SSDEEP
6144:PCqpuLBZTT8+ArC/oi2MXZ8yAqHDOyH/45HGBWxZ5zelfyG/UPojzjjzz/ex7Vxl:GLBwEkX5mYdzyfy/czjSVCJgr3
Malware Config
Signatures
Files
-
3669e56e2f0048d117d86100d11c5d22_JaffaCakes118.exe windows:4 windows x86 arch:x86
e4c53ceb6c5095a287a303c6aebdfefb
Code Sign
2f:4c:dc:c2:2d:52:81:c1:c9:27:87:8e:b9:e9:a9:2d:6a:5c:36:7fSigner
Actual PE Digest2f:4c:dc:c2:2d:52:81:c1:c9:27:87:8e:b9:e9:a9:2d:6a:5c:36:7fDigest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
version
VerQueryValueW
wininet
HttpEndRequestA
kernel32
GetVersion
GetDefaultCommConfigA
ExitProcess
VirtualAlloc
ReadFile
GetLastError
GetTickCount
CloseHandle
CreateFileMappingA
FreeResource
FreeLibrary
FindResourceA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
GetCommandLineA
GetStringTypeA
MultiByteToWideChar
LockResource
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapAlloc
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapFree
GetStartupInfoA
SetFilePointer
GetSystemTimeAsFileTime
GetCommandLineW
GetModuleHandleA
GetProcAddress
CreateThread
GetVersionExA
GetUserDefaultLangID
WriteFile
GetStringTypeW
LCMapStringA
LCMapStringW
LoadLibraryA
user32
IsIconic
GetDC
IsChild
MessageBoxA
GetSystemMetrics
InvalidateRect
GetWindowLongA
GetSystemMenu
GetClassInfoA
GetCapture
IntersectRect
GetWindowThreadProcessId
RegisterClassW
IsRectEmpty
IsWindow
RemovePropA
SetMenu
SetMenuItemInfoA
SetPropA
SetRect
SetScrollInfo
GetWindowPlacement
GetWindowRect
GetClassNameA
GetKeyboardType
GetScrollPos
PtInRect
LoadStringA
CreateDialogParamA
SetScrollRange
GetClientRect
DialogBoxParamA
CreateWindowExA
RegisterClassExA
IsDialogMessageA
gdi32
ExcludeClipRect
CreatePen
Rectangle
GetDeviceCaps
SetBkColor
GetClipBox
CreatePenIndirect
TextOutW
advapi32
RegCreateKeyExA
RegCloseKey
RegSetValueExW
GetUserNameA
ole32
CoUninitialize
CoInitialize
CoTaskMemAlloc
oleaut32
SafeArrayGetUBound
SafeArrayRedim
SafeArrayGetLBound
SafeArrayGetElement
SafeArrayCreate
SysAllocStringLen
SysReAllocStringLen
SafeArrayPutElement
Sections
.text Size: 404KB - Virtual size: 402KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.qdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ