Static task
static1
Behavioral task
behavioral1
Sample
d100536f900b3b95d1dda7cc81a46ae6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d100536f900b3b95d1dda7cc81a46ae6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d100536f900b3b95d1dda7cc81a46ae6_JaffaCakes118
-
Size
1.5MB
-
MD5
d100536f900b3b95d1dda7cc81a46ae6
-
SHA1
a4dd298fc33e2e1af81a8a53640fe5ad864a6ebd
-
SHA256
890dcae39d122de48949d4fcffebe7a1e35dc81129a5612fa4725eb914194494
-
SHA512
51b606c7f8ee246ede1cc18bc03c86c21c1d684a197998707cca765e36933f40869df1014bfe411d597ce32e47c30b6aa4b4dc2954fdd0f4db9594e5e0c6e6dc
-
SSDEEP
49152:cBtEewAcbrbH6BYjwdYNpAjGfYKcijwYG:cyAcnbaBYjBnAjGFcOe
Malware Config
Signatures
Files
-
d100536f900b3b95d1dda7cc81a46ae6_JaffaCakes118.exe windows:4 windows x86 arch:x86
5b30d77ec1d2b00b0f4c290b192868ba
Code Sign
49:ba:b6:52:15:4d:89:a4:46:9f:2e:e2:bd:c3:c1:73Certificate
IssuerCN=Root AgencyNot Before10/06/2010, 09:22Not After31/12/2039, 23:59SubjectCN=DesktopTools,OU=WWW.CeleWare.NET,O=CeleWare.NET,1.2.840.113549.1.9.1=#0c194465736b746f70546f6f6c734043656c65576172652e4e4554Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
d:\desktop\Setup\bin\release\Installer.pdb
Imports
kernel32
CreateFileW
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
RaiseException
RtlUnwind
HeapSize
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
Sleep
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
VirtualAlloc
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CreateFileA
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetLocaleInfoW
InterlockedExchange
GetModuleHandleA
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
LoadLibraryW
LoadLibraryA
GetVersionExA
GlobalFlags
lstrcmpW
GetCurrentThreadId
GetThreadLocale
GetVersion
InterlockedIncrement
FreeLibrary
InterlockedDecrement
InterlockedCompareExchange
GetModuleHandleW
GetProcAddress
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
LocalFree
SetLastError
WaitForSingleObject
CreateThread
GetModuleFileNameW
CloseHandle
GetCurrentProcess
TerminateProcess
WideCharToMultiByte
OpenProcess
GetTickCount
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
lstrlenW
RemoveDirectoryW
DeleteFileW
SetFileAttributesW
LockResource
GetUserDefaultLangID
GetLastError
HeapDestroy
CreateDirectoryW
user32
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
RegisterWindowMessageW
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
CallWindowProcW
SystemParametersInfoA
IsIconic
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
SetWindowPos
SetWindowLongW
IsWindow
GetDlgItem
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
DestroyMenu
PtInRect
SetWindowTextW
SetWindowsHookExW
CallNextHookEx
GetKeyState
PeekMessageW
ValidateRect
GetWindowTextW
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowPlacement
UnhookWindowsHookEx
GetWindowThreadProcessId
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxW
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
UpdateWindow
ShowWindow
CreateWindowExW
RegisterClassExW
LoadCursorW
LoadIconW
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
LoadAcceleratorsW
LoadStringW
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcW
DestroyWindow
PostMessageW
SendMessageW
UnregisterClassA
gdi32
DeleteDC
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetDeviceCaps
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
DeleteObject
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegEnumKeyExW
RegCloseKey
RegDeleteKeyW
shell32
SHGetSpecialFolderPathW
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
VariantInit
VariantClear
VariantChangeType
wininet
InternetOpenW
InternetOpenUrlW
InternetReadFile
InternetCloseHandle
psapi
GetModuleFileNameExW
EnumProcessModules
EnumProcesses
Sections
.text Size: 212KB - Virtual size: 208KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ