Static task
static1
Behavioral task
behavioral1
Sample
12c05b8ae967cbffe168717ecf661940_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
12c05b8ae967cbffe168717ecf661940_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
12c05b8ae967cbffe168717ecf661940_JaffaCakes118
-
Size
2.1MB
-
MD5
12c05b8ae967cbffe168717ecf661940
-
SHA1
bb23055c3f3f0d90bfad303350161553cdce321f
-
SHA256
000ea35a7ad2b6325524fb38985d8f42bf6af6f984b31be73b4a3c735d97914f
-
SHA512
08806571e4ec9bc80969821d83a609edea48e19df93ffcf4dcfe059952ca1da7c391289ba3924f5af68e50cb9fdc00a70a7244e26a77eae964f7d1816719aad6
-
SSDEEP
49152:DnXVsUWM+I9FRi2Gylv3CGLut45iQgQfTV6bwMD+dv+d5ftHk:DnXVsUbhXlSGKt45iLQbUbPD+d8tE
Malware Config
Signatures
Files
-
12c05b8ae967cbffe168717ecf661940_JaffaCakes118.exe windows:5 windows x86 arch:x86
849345e5d7ea8c096554dc2b452051f5
Code Sign
a7:60:48:21:4d:04:cb:f8:15:bd:6a:a0:6f:a0:58:be:e5:b7:5b:19Signer
Actual PE Digesta7:60:48:21:4d:04:cb:f8:15:bd:6a:a0:6f:a0:58:be:e5:b7:5b:19Digest Algorithmsha1PE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteCriticalSection
GetShortPathNameW
GetLongPathNameW
GetSystemDirectoryW
MapViewOfFile
CreateFileMappingW
OpenFileMappingW
DeleteFileW
CreateDirectoryW
GetTempPathW
FreeLibrary
LoadLibraryW
RemoveDirectoryW
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
UnmapViewOfFile
InitializeCriticalSection
CreateMutexW
GetLastError
GetWindowsDirectoryW
FindFirstFileW
lstrcpynW
FindClose
WideCharToMultiByte
GetCommandLineW
lstrlenA
SetLastError
MultiByteToWideChar
lstrlenW
ReadProcessMemory
LoadLibraryExW
GetModuleFileNameW
lstrcmpW
InterlockedIncrement
DebugBreak
OutputDebugStringW
DeviceIoControl
CreateFileW
GetVersionExW
HeapFree
HeapAlloc
GetProcessHeap
SizeofResource
LockResource
GetVersion
FindResourceW
WriteFile
IsBadStringPtrW
MoveFileExW
GetShortPathNameA
GetWindowsDirectoryA
RtlUnwind
EncodePointer
DecodePointer
RaiseException
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
Sleep
HeapSize
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
GetFileAttributesW
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetStringTypeW
HeapReAlloc
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointer
LCMapStringW
WriteConsoleW
SetStdHandle
FlushFileBuffers
CreateFileA
SetEndOfFile
GetSystemInfo
GetCurrentProcessId
Module32FirstW
Module32NextW
CloseHandle
GetModuleHandleW
GetModuleHandleA
FlushInstructionCache
lstrcmpiA
GetCurrentProcess
LoadResource
GetProcAddress
advapi32
RegOpenKeyExW
RegSetValueExW
RegQueryValueExW
RegOpenKeyW
RegEnumKeyExW
RegCloseKey
ole32
CoTaskMemFree
CLSIDFromString
StringFromCLSID
oleaut32
SysFreeString
SysAllocString
shlwapi
PathFileExistsW
PathAppendA
PathRemoveFileSpecW
StrCmpIW
StrStrIW
PathFindFileNameW
SHGetValueW
PathAppendW
user32
wvsprintfW
LoadStringW
CharUpperW
CharNextW
Sections
.text Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ