Static task
static1
Behavioral task
behavioral1
Sample
47cfb7f2526853296be7fde3c8ae3482_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
47cfb7f2526853296be7fde3c8ae3482_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
47cfb7f2526853296be7fde3c8ae3482_JaffaCakes118
-
Size
1.3MB
-
MD5
47cfb7f2526853296be7fde3c8ae3482
-
SHA1
f391a063bf6e1750145ac8a85a5b0e08b7e0e72a
-
SHA256
45294e7b83ab19d2f78b6ddc759a77beb4ec1e391bfac6b4a8efd8938babca1c
-
SHA512
1098fe23db5af569285a676a7785eea0dba179696cdd6724b9f001233cc0ff9ec06499d0b83ff8267c357533322e5915d310a949a67c1ba57e7bc2b57b51f0c4
-
SSDEEP
12288:UiLJ5i7sJXx0douBjhCCAYi8c1i6oaeNSoeDlHsg+2Vasj0eqiH:pspfjxAf8c46oaKeD5l+25j0tiH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 47cfb7f2526853296be7fde3c8ae3482_JaffaCakes118
Files
-
47cfb7f2526853296be7fde3c8ae3482_JaffaCakes118.exe windows:5 windows x86 arch:x86
9a473010e067adbb657740f2fdb0c484
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
oleacc
AccessibleObjectFromWindow
kernel32
InterlockedIncrement
lstrcmpiW
LoadLibraryExW
EncodePointer
LeaveCriticalSection
InterlockedDecrement
EnterCriticalSection
WideCharToMultiByte
GetCurrentProcessId
CreateThread
MultiByteToWideChar
SetFileAttributesW
GetFileAttributesW
GetProcessId
GetModuleFileNameW
CreateDirectoryW
MulDiv
GetModuleHandleW
GetProcessHeap
ReadConsoleW
SetEndOfFile
WriteConsoleW
SetFilePointerEx
FlushFileBuffers
SetStdHandle
FreeLibrary
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetConsoleMode
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
ReadFile
FindResourceW
LoadResource
FindResourceExW
RaiseException
HeapReAlloc
LockResource
GetLastError
Sleep
HeapSize
InitializeCriticalSectionAndSpinCount
HeapFree
SizeofResource
GetProcAddress
IsValidLocale
GetFileType
GetACP
WriteFile
GetStdHandle
GetModuleHandleExW
ExitProcess
VirtualQuery
VirtualProtect
GetSystemInfo
RtlUnwind
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStringTypeW
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
SetLastError
GetCurrentProcess
GetEnvironmentVariableW
FormatMessageW
CloseHandle
LocalFree
OutputDebugStringW
SetFilePointer
CreateFileW
GetFileSize
GetCurrentThreadId
GlobalAlloc
GlobalLock
GlobalUnlock
lstrcmpW
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
InterlockedPopEntrySList
user32
UpdateWindow
GetDesktopWindow
ReleaseDC
EndPaint
BeginPaint
KillTimer
CallWindowProcW
PostMessageW
CharNextW
MessageBoxW
ShowWindow
InvalidateRect
GetWindowLongW
GetWindowThreadProcessId
GetMessageW
DefWindowProcW
GetWindowRect
DestroyWindow
GetDC
IsWindowVisible
SetWindowPos
EqualRect
EnumChildWindows
CreateWindowExW
GetSystemMetrics
UnregisterClassW
RegisterClassExW
IsWindow
DispatchMessageW
SetTimer
PeekMessageW
GetWindowTextW
GetCursorPos
SetForegroundWindow
ReleaseCapture
RegisterWindowMessageW
GetParent
GetClassInfoExW
GetDlgItem
GetClientRect
SetCapture
SetFocus
CreateAcceleratorTableW
GetSysColor
IsChild
DestroyAcceleratorTable
ClientToScreen
RedrawWindow
InvalidateRgn
SetWindowTextW
SendMessageW
ScreenToClient
FillRect
GetFocus
GetWindow
GetWindowTextLengthW
MoveWindow
EnumWindows
LoadBitmapW
SetLayeredWindowAttributes
TranslateMessage
LoadCursorW
GetClassNameW
SetWindowLongW
DrawTextW
gdi32
GetObjectW
DeleteDC
GetStockObject
CreateCompatibleBitmap
CreateSolidBrush
CreateFontIndirectW
SetBkMode
SetTextColor
GetDIBits
CreateCompatibleDC
SelectObject
BitBlt
DeleteObject
GetDeviceCaps
advapi32
CryptAcquireContextW
RegEnumKeyW
RegQueryInfoKeyW
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegSetValueExW
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptGetHashParam
RegQueryValueExW
CryptReleaseContext
shell32
SHGetFolderPathW
ShellExecuteW
ShellExecuteExW
ole32
OleLockRunning
CoGetClassObject
OleUninitialize
StringFromGUID2
CoTaskMemRealloc
CreateStreamOnHGlobal
OleInitialize
CLSIDFromString
CLSIDFromProgID
CoCreateGuid
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CoUninitialize
CoInitialize
oleaut32
LoadTypeLi
OleCreateFontIndirect
VarBstrCat
SysStringLen
SysAllocStringLen
LoadRegTypeLi
VariantClear
VarBstrCmp
SysAllocString
SysFreeString
VariantInit
VarUI4FromStr
shlwapi
UrlEscapeW
UrlUnescapeW
PathAppendW
PathAddBackslashW
wininet
InternetCloseHandle
HttpSendRequestW
InternetCrackUrlW
InternetOpenW
HttpOpenRequestW
InternetConnectW
Sections
.text Size: 280KB - Virtual size: 279KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 174KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.AESeal Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 812KB - Virtual size: 811KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ