Static task
static1
Behavioral task
behavioral1
Sample
47195eaf73b6034d0a564ade2e59b291_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
47195eaf73b6034d0a564ade2e59b291_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
47195eaf73b6034d0a564ade2e59b291_JaffaCakes118
-
Size
484KB
-
MD5
47195eaf73b6034d0a564ade2e59b291
-
SHA1
4283834528e3d481581b1c48eecdafc88b83819d
-
SHA256
6cb5e827db577a760ba71cf33deb9c5c05b93d7f6d36a48143d6745bc7019977
-
SHA512
90bbfc5f7a3147d4e23cd690b7b9fe63dc76ca08290c7b7e00d831a1207d7a76090a5daff62d81e06c0db823a97d07ab61652315f5cbc8b52d4d553e57f810d0
-
SSDEEP
6144:U0E1iEP4LSVt2c8Gn1lp3SO95WhXwOh9rBRBvcl:vJEOSVt0Gn1lp3SaEhX9fBR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 47195eaf73b6034d0a564ade2e59b291_JaffaCakes118
Files
-
47195eaf73b6034d0a564ade2e59b291_JaffaCakes118.exe windows:4 windows x86 arch:x86
5cccde9c3769313b136c909300e1a442
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetStdHandle
GetFileType
HeapReAlloc
HeapSize
SetUnhandledExceptionFilter
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetLocaleInfoW
GetACP
GetCommandLineA
GetStartupInfoA
GetProfileStringA
InterlockedExchange
HeapAlloc
GetLocalTime
GetSystemTime
GetTimeZoneInformation
HeapFree
RaiseException
TerminateProcess
ExitProcess
RtlUnwind
GetTickCount
SetErrorMode
GetOEMCP
GetCPInfo
SizeofResource
GetProcessVersion
GetCurrentDirectoryA
WritePrivateProfileStringA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
GetFileTime
GetFileSize
GetThreadLocale
GetFullPathNameA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetCurrentProcess
DuplicateHandle
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
lstrcpynA
EnterCriticalSection
FindNextFileA
MulDiv
SetLastError
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
WaitForSingleObject
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
FileTimeToLocalFileTime
FileTimeToSystemTime
FormatMessageA
LocalFree
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GetVersionExA
MultiByteToWideChar
CreateDirectoryA
CreateFileA
WriteFile
CloseHandle
LoadLibraryA
GetProcAddress
FreeLibrary
lstrcpyA
lstrlenA
GetFileAttributesA
FindFirstFileA
FindClose
GetModuleHandleA
GetModuleFileNameA
Sleep
DeleteFileA
CreateMutexA
GetLastError
GetWindowsDirectoryA
GetSystemDirectoryA
GetStdHandle
CreateProcessA
user32
MoveWindow
SetWindowTextA
IsDialogMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
ScreenToClient
GetClientRect
CopyRect
GetTopWindow
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
ShowWindow
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
MapDialogRect
SetWindowPos
GetWindow
SetWindowContextHelpId
EndDialog
SetActiveWindow
IsWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
wsprintfA
LoadIconA
SetWindowLongA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
IsWindowUnicode
SendMessageA
GetWindowRect
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
ClientToScreen
GetDC
ReleaseDC
GetWindowDC
PostThreadMessageA
RegisterClipboardFormatA
MessageBoxA
SetCursor
PostMessageA
EnableWindow
SetTimer
PostQuitMessage
KillTimer
InflateRect
InvalidateRect
DestroyMenu
MessageBeep
GetNextDlgGroupItem
SetRect
CopyAcceleratorTableA
CharNextA
BeginPaint
PtInRect
GetClassNameA
LoadCursorA
LoadStringA
CharUpperA
GetDesktopWindow
GrayStringA
GetMenuCheckMarkDimensions
DrawTextA
TabbedTextOutA
OffsetRect
EndPaint
GetSysColorBrush
gdi32
DeleteObject
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
IntersectClipRect
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
PatBlt
GetTextColor
GetBkColor
DPtoLP
LPtoDP
GetMapMode
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateSolidBrush
CreateDIBitmap
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
shell32
SHGetSpecialFolderPathA
comctl32
ord17
oledlg
ord8
ole32
OleInitialize
OleUninitialize
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoFreeUnusedLibraries
olepro32
ord253
oleaut32
SysAllocStringLen
SysFreeString
VariantClear
VariantCopy
SysAllocString
SysAllocStringByteLen
VariantChangeType
VariantTimeToSystemTime
SysStringLen
urlmon
URLDownloadToFileA
shlwapi
StrFormatByteSizeA
Sections
.text Size: 280KB - Virtual size: 276KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ