Static task
static1
Behavioral task
behavioral1
Sample
416db420e781c709bb71acee0b79282f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
416db420e781c709bb71acee0b79282f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
416db420e781c709bb71acee0b79282f_JaffaCakes118
-
Size
557KB
-
MD5
416db420e781c709bb71acee0b79282f
-
SHA1
bdd2bae83c3bab9ba0c199492fe57e70c6425dd3
-
SHA256
4bcb2a5d99297b30f8ff00e08cf7330d5e2f69fc602bb317bf8e9f703a137a99
-
SHA512
31a229abfc2e7039db7e5bb8510cdd89b0ef4d2ea1e22293cb9cc26a4f73ac07dd2456e0b0ac30000d43f20b87c4abdd53fdb7556912da66824406e98347df5e
-
SSDEEP
12288:6cdkVE1wqnLHHP1W0Tilcyy3VLk3BWpC/c3fvYQuObIk:XOXqLHHNWy3VLk31k3fA
Malware Config
Signatures
Files
-
416db420e781c709bb71acee0b79282f_JaffaCakes118.exe windows:5 windows x86 arch:x86
6b26d617da672dd0f81bc0acedbb94f7
Code Sign
6d:43:c9:a2:fd:31:d1:55:b9:81:43:fc:2b:8d:a8:16Certificate
IssuerCN=Advanced Micro Devices\, Inc.Not Before25-02-2015 15:35Not After31-12-2039 23:59SubjectCN=Advanced Micro Devices\, Inc.ab:5a:dd:5c:41:17:15:ad:58:a6:15:8a:1a:3d:bf:b3:b8:2f:82:96Signer
Actual PE Digestab:5a:dd:5c:41:17:15:ad:58:a6:15:8a:1a:3d:bf:b3:b8:2f:82:96Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetModuleFileNameW
GetCommandLineW
GetSystemDirectoryW
CopyFileW
GetCurrentProcessId
FindResourceW
LoadResource
GetModuleHandleW
SizeofResource
LockResource
VirtualProtect
CloseHandle
CreateFileA
SetFilePointer
CreateDirectoryW
WriteFile
GetFileAttributesW
CreateFileW
MultiByteToWideChar
GetProcAddress
LoadLibraryA
lstrlenA
WideCharToMultiByte
LocalFree
DecodePointer
HeapSetInformation
GetStartupInfoW
EncodePointer
LoadLibraryW
RtlUnwind
RaiseException
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetConsoleCP
GetConsoleMode
LCMapStringW
GetStringTypeW
HeapReAlloc
SetStdHandle
WriteConsoleW
FlushFileBuffers
GetCurrentProcess
HeapAlloc
ExpandEnvironmentStringsW
CreatePipe
GetLastError
ReadFile
GetVersionExW
WaitForSingleObject
SetHandleInformation
InterlockedDecrement
CreateProcessW
SetUnhandledExceptionFilter
SetErrorMode
Sleep
InitializeCriticalSectionAndSpinCount
ExitProcess
user32
wsprintfW
advapi32
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
CryptReleaseContext
CryptAcquireContextW
ole32
CoSetProxyBlanket
CoCreateInstance
CoInitialize
CoUninitialize
CoInitializeEx
oleaut32
SysAllocString
VariantClear
SysFreeString
SysStringLen
VariantInit
shlwapi
PathFileExistsW
PathAddBackslashW
PathQuoteSpacesW
StrStrIW
Sections
.text Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 437KB - Virtual size: 437KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ