Static task
static1
Behavioral task
behavioral1
Sample
840aed621cdd9798a16cdafdb7f6b5d0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
840aed621cdd9798a16cdafdb7f6b5d0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
840aed621cdd9798a16cdafdb7f6b5d0_JaffaCakes118
-
Size
417KB
-
MD5
840aed621cdd9798a16cdafdb7f6b5d0
-
SHA1
4177d06bb3a3b4140d4f2be9249fd91a5d41a906
-
SHA256
5d57a7353f68a0d07687eb75081d5bb456bdde0079d47c5286be72d4e8c3907d
-
SHA512
38d9f4f6e85c9e514e9de1c104e176f3752d990045678a03e93e5c521d633a4c40bd80a1b6fbe5f5e2abbbed0c96cb384fbeb21e9beac32355f3bdf56d25c4f2
-
SSDEEP
12288:LHPyFeMedrYiQqgKCF3EcDQYU5LGRum8Jh0P:jPQi7COcDPU5LG0m8JSP
Malware Config
Signatures
Files
-
840aed621cdd9798a16cdafdb7f6b5d0_JaffaCakes118.exe windows:4 windows x86 arch:x86
184b7d6a068728f46d3625b51322bf65
Code Sign
39:e2:e9:c6:73:07:3b:8e:40:29:2d:06:b6:8c:a9:ffCertificate
IssuerCN=eijrlfdivmoNot Before02/02/2012, 14:53Not After31/12/2039, 23:59SubjectCN=Celop6f:4b:66:8b:c4:ea:44:00:16:57:de:88:d2:a5:a5:52:84:11:f0:64Signer
Actual PE Digest6f:4b:66:8b:c4:ea:44:00:16:57:de:88:d2:a5:a5:52:84:11:f0:64Digest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDlgCtrlID
SetWindowPlacement
GetWindowTextLengthA
IsWindow
CascadeWindows
MessageBoxIndirectA
MessageBoxExA
SetForegroundWindow
BeginDeferWindowPos
ShowWindowAsync
WindowFromPoint
DeferWindowPos
GetDlgItemTextA
MessageBoxA
ole32
StgIsStorageFile
CoMarshalInterface
OleCreateLinkToFile
OleCreateLinkFromDataEx
CoGetStdMarshalEx
ReadClassStm
CoGetPSClsid
WriteClassStm
CoUnmarshalHresult
OleCreateMenuDescriptor
StringFromCLSID
CoMarshalHresult
StgIsStorageILockBytes
oledlg
ord9
ord1
ord3
ord4
ord2
ord10
ord8
ord12
ord5
ord11
ord7
ord6
advapi32
RegDeleteValueA
RegSetValueExA
RegQueryInfoKeyA
RegQueryValueExA
RegOpenKeyA
RegSetValueA
RegOverridePredefKey
RegCreateKeyExA
RegEnumKeyA
kernel32
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetCurrentThreadId
TlsSetValue
GetVersion
GetStringTypeW
TlsGetValue
GetLastError
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
VirtualAlloc
GetCommandLineA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStringTypeA
SetLastError
QueryPerformanceCounter
GetTickCount
TlsAlloc
LocalAlloc
VirtualAllocEx
GetProcessHeap
GetTimeFormatA
HeapValidate
GlobalMemoryStatus
GetUserDefaultLCID
GlobalFlags
WritePrivateProfileStringA
WritePrivateProfileSectionA
LCMapStringW
LCMapStringA
MultiByteToWideChar
LoadLibraryA
HeapReAlloc
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 402KB - Virtual size: 401KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ