Static task
static1
Behavioral task
behavioral1
Sample
462dac1a3f838efdd02e69a5d4e297b5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
462dac1a3f838efdd02e69a5d4e297b5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
462dac1a3f838efdd02e69a5d4e297b5_JaffaCakes118
-
Size
236KB
-
MD5
462dac1a3f838efdd02e69a5d4e297b5
-
SHA1
f5a0bbdc1bdfb1470bfd13907a3953cbd4b715ee
-
SHA256
4309c02129b73cbb33da96819e83354dcaaace7653cf3b0421c7f88644bf5516
-
SHA512
0b7fd41aa883bd5a87e3b02f08f4c37d00cf38685d0a0eafe97137949e1af2fc6c4cb4e1bc4b3fcb99e43a1e74cbf6eec4a456cc4be08a7a57eb527a43087d66
-
SSDEEP
6144:OV09db5YosPkiTiW86Ipyd5G0TUl4DTLOOsVd8K/:O+TiTiW86Ipyd5sr/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 462dac1a3f838efdd02e69a5d4e297b5_JaffaCakes118
Files
-
462dac1a3f838efdd02e69a5d4e297b5_JaffaCakes118.exe windows:4 windows x86 arch:x86
64d4b6330acf32cd21c4e5179625a1b4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHDeleteKeyW
PathRemoveFileSpecW
PathUnquoteSpacesW
PathRemoveArgsW
PathRemoveBlanksW
pcscm
??0CCommonAboutDlg@@QAE@XZ
??1CSplashWnd@@UAE@XZ
?SetStaticMembers@CNMessageBoxDlg@@SAHPAUHINSTANCE__@@0HHHHHHHHHHHHHHHHHHHH@Z
?Show@CSplashWnd@@QAEHI@Z
??0CSplashWnd@@QAE@PAUHINSTANCE__@@I@Z
?PcsInitializeWER@@YAHXZ
?GetUIManufacturer@CPCSL2InfoReader@@QAEPBGXZ
?ReadPCSL@CPCSL2InfoReader@@QAEHPAG@Z
??1CPCSL2InfoReader@@QAE@XZ
??0CPCSL2InfoReader@@QAE@XZ
?SelectDevice@CCSDWrapper@@QAEJH@Z
?RemoveListener@CCSDWrapper@@QAEXPAVCCSDWrapperListener@@@Z
?Initialize@CCSDWrapper@@QAEJPAUHWND__@@@Z
?SetSupportedDevices@CCSDWrapper@@QAEXPBG@Z
?SetSelectionMode@CCSDWrapper@@QAEXK@Z
?Update@CTitleBarHelper@@QAEXXZ
?SetApplicationName@CTitleBarHelper@@QAEXPBGH@Z
??1CCommonAboutDlg@@UAE@XZ
?GetSupportedDeviceCount@CCSDWrapper@@QAEHXZ
?AddListener@CCSDWrapper@@QAEXPAVCCSDWrapperListener@@@Z
??1CCSDWrapper@@UAE@XZ
??0CCSDWrapper@@QAE@XZ
??1CTitleBarHelper@@UAE@XZ
??0CTitleBarHelper@@QAE@XZ
?MessageBoxW@CNMessageBoxDlg@@QAEHPAUHWND__@@III@Z
??1CNMessageBoxDlg@@QAE@XZ
??0CNMessageBoxDlg@@QAE@XZ
??1CNbuuButtonSkin@@UAE@XZ
?SetSkinDef@?$CNbuuBaseSkinImpl@VCNbuuStaticBitmapSkin@@VCNbuuStaticBitmapSkinDef@@@@UAEXVCNbuuStaticBitmapSkinDef@@@Z
?IsValid@?$CNbuuBaseSkinImpl@VCNbuuStaticBitmapSkin@@VCNbuuStaticBitmapSkinDef@@@@UAE_NXZ
?Validate@CNbuuStaticBitmapSkin@@UAEXXZ
?Draw@CNbuuStaticBitmapSkin@@UAEXPAVCNbuuWindow@@PAVCNbuuGraphics@@HH@Z
?Load@CNbuuStaticBitmapSkin@@UAEXXZ
?Unload@CNbuuStaticBitmapSkin@@UAEXXZ
?DrawParentBackBuffer@CNbuuBackBuffer@@UAEXPAUHDC__@@UtagRECT@@@Z
?SetAboutBoxParams@CCommonAboutDlg@@QAEHPAUtagABOUTBOXPARAMS@@@Z
?DoModal@CCommonAboutDlg@@QAEHXZ
?FreeMemory@CNMessageBoxDlg@@SAXXZ
?PCSCM_Finalize@@YAXXZ
?GetFirstPhoneManufacturer@CPCSL2InfoReader@@QAEPBGXZ
?GetNextPhoneManufacturer@CPCSL2InfoReader@@QAEPBGXZ
?DrawBackBufferPart@CNbuuBackBuffer@@UAEXPAUHDC__@@UtagRECT@@11@Z
??1CNBitmapUtil@@QAE@XZ
?GetBitmapWidth@CNBitmapUtil@@QAEHW4BitmapType@@@Z
?GetBitmapHeight@CNBitmapUtil@@QAEHW4BitmapType@@@Z
?Hide@CSplashWnd@@QAEHI@Z
??0CNBitmapUtil@@QAE@XZ
?NLoadBitmap@CNBitmapUtil@@QAEPAUHBITMAP__@@PAUHINSTANCE__@@HW4BitmapType@@H@Z
?AlphaBlendBitmapsBGPos@CNBitmapUtil@@QAEHHHHHH@Z
?DeleteBitmap@CNBitmapUtil@@QAEPAUHBITMAP__@@W4BitmapType@@H@Z
?MirrorSection@CNBitmapUtil@@QAEHW4BitmapType@@HHHHHHH@Z
?CreateColorBackground@CNBitmapUtil@@QAEHKHH@Z
?AlphaBlendBitmaps@CNBitmapUtil@@QAEHHHH@Z
?SetWindow@CTitleBarHelper@@QAEHPAUHWND__@@@Z
?DrawBackBuffer@CNbuuBackBuffer@@UAEXPAUHDC__@@UtagRECT@@1@Z
?GetBitmapHandle@CNBitmapUtil@@QAEPAUHBITMAP__@@W4BitmapType@@H@Z
?DeleteBackBuffer@CNbuuBackBuffer@@UAEXXZ
?CreateBackBuffer@CNbuuBackBuffer@@UAEXHHPAVCNbuuGraphics@@@Z
?SetSkinDef@CNbuuButtonSkin@@UAEXVCNbuuButtonSkinDef@@@Z
?Validate@CNbuuButtonSkin@@UAEXXZ
?Draw@CNbuuButtonSkin@@UAEXPAVCNbuuWindow@@PAVCNbuuGraphics@@HH@Z
?IsValid@CNbuuButtonSkin@@UAE_NXZ
?Unload@CNbuuButtonSkin@@UAEXXZ
?Load@CNbuuButtonSkin@@UAEXXZ
?Init@CNbuuLib@@SAXPAUHINSTANCE__@@0@Z
?PcsLoadColor@@YAKPAUHINSTANCE__@@I@Z
??0CNbuuButtonCtrl@@QAE@XZ
??0CNbuuStaticCtrl@@QAE@XZ
??0CNbuuStaticBitmapSkin@@QAE@XZ
??0CNbuuButtonSkin@@QAE@XZ
??1CNbuuButtonCtrl@@UAE@XZ
??1CNbuuStaticCtrl@@UAE@XZ
??1CNbuuStaticBitmapSkin@@UAE@XZ
mfc80u
ord572
ord760
ord1955
ord501
ord709
ord2366
ord1086
ord1894
ord6271
ord3331
ord4255
ord4480
ord3943
ord2638
ord3703
ord3713
ord3712
ord2527
ord2640
ord2534
ord2856
ord2708
ord4301
ord2829
ord2725
ord2531
ord5196
ord5171
ord1353
ord4961
ord3339
ord6275
ord3796
ord6273
ord1513
ord2163
ord2169
ord2399
ord2381
ord2379
ord2402
ord2407
ord2388
ord2404
ord931
ord927
ord929
ord925
ord920
ord5956
ord1591
ord4276
ord4716
ord3397
ord5210
ord4179
ord5067
ord1899
ord5148
ord4238
ord1393
ord3940
ord1608
ord1611
ord5911
ord6721
ord762
ord3435
ord354
ord605
ord1784
ord3635
ord4574
ord1079
ord4256
ord5199
ord1392
ord5908
ord6720
ord1661
ord1662
ord2011
ord4884
ord4729
ord5178
ord266
ord265
ord557
ord745
ord5442
ord1923
ord3872
ord6002
ord2860
ord4109
ord386
ord631
ord2279
ord3925
ord1176
ord3460
ord3642
ord395
ord635
ord2365
ord4293
ord5855
ord5923
ord3071
ord2424
ord5161
ord3395
ord6061
ord4119
ord4259
ord4271
ord1297
ord2164
ord5201
ord5144
ord3939
ord4013
ord2418
ord2419
ord5352
ord940
ord4898
ord2933
ord4129
ord4303
ord5006
ord5003
ord2609
ord1904
ord2237
ord6086
ord3677
ord757
ord1155
ord1049
ord1117
ord4025
ord547
ord956
ord334
ord593
ord5113
ord5221
ord5654
ord2239
ord3327
ord4475
ord2832
ord5562
ord5209
ord5226
ord4562
ord3942
ord5222
ord5220
ord2925
ord1911
ord3826
ord5378
ord6215
ord3800
ord5579
ord3678
ord6274
ord3795
ord6272
ord4008
ord4032
ord3444
ord3639
ord368
ord616
ord4699
ord4258
ord4476
ord2762
ord3034
ord4216
ord1913
ord4251
ord5408
ord1370
ord5588
ord5152
ord2007
ord6234
ord2615
ord2608
ord4560
ord3585
ord4346
ord3676
ord565
ord756
ord1627
ord1539
ord3166
ord1922
ord1474
ord4092
ord2080
ord4228
ord2985
ord592
ord2083
ord4232
ord2952
ord3224
ord658
ord416
ord651
ord1960
ord5170
ord5609
ord5727
ord3204
ord3157
ord1271
ord1925
ord4585
ord347
ord602
ord1270
ord1920
ord2151
ord4300
ord1562
ord1299
ord2167
ord5522
ord5829
ord1272
ord2364
ord6751
ord6749
ord1946
ord4094
ord2085
ord3238
ord1274
ord6140
ord4267
ord2788
ord5867
ord2361
ord2255
ord1352
ord3338
ord5147
ord3968
ord4855
ord4858
ord4373
ord4378
ord4375
ord4393
ord4395
ord4380
ord4771
ord4175
ord4166
ord4775
ord4198
ord4784
ord4437
ord4438
ord553
ord742
ord1634
ord1572
ord3286
ord715
ord3669
ord764
ord4752
ord2868
ord4931
ord4290
ord3312
ord1953
ord5198
ord6265
ord5141
ord4235
ord1341
ord1334
ord4984
ord1344
ord2030
ord2068
ord2072
ord1903
ord3981
ord5351
ord3923
ord4191
ord6010
ord1583
ord1639
ord2087
ord1051
ord1021
ord2898
ord1431
ord741
ord6033
ord3311
ord4234
ord2086
ord3483
ord3645
ord4755
ord1156
ord1590
ord1646
ord1647
ord2397
ord2409
ord2386
ord2390
ord2392
ord2394
ord2384
ord5229
ord5231
ord293
ord577
ord6063
ord5803
ord1542
ord774
ord776
ord283
ord280
ord5711
ord5712
ord2460
ord6700
ord282
ord1479
ord6094
ord3990
ord5558
ord4100
ord6173
ord5524
ord2261
ord5485
ord1476
ord778
ord3869
ord2271
ord2745
ord1472
ord2260
ord896
ord2444
ord287
ord5925
ord6301
ord3103
ord1548
ord2121
ord5398
ord4026
ord566
ord5971
ord1058
ord5096
ord1007
ord2009
ord4320
ord290
ord5484
ord1906
ord900
ord899
ord1236
ord2311
ord777
ord3873
ord5869
ord5862
ord6039
ord5930
ord4733
ord4846
ord5491
ord2736
ord2042
ord6161
ord6167
ord860
ord1118
ord2876
ord2742
ord277
ord1582
ord2461
ord1198
ord2054
ord5168
msvcr80
wcstok
_wcsdup
_wstat64i32
_purecall
exit
_vswprintf
_swprintf
malloc
ceil
_wfopen
fgetws
feof
fclose
_wtol
_wcsicmp
fseek
ftell
memset
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
?terminate@@YAXXZ
_except_handler4_common
_invoke_watson
_controlfp_s
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
free
memcpy
_CxxThrowException
__CxxFrameHandler3
floor
wcsstr
kernel32
LoadResource
lstrcpyW
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
OpenEventA
CreateEventA
ResetEvent
WaitForMultipleObjects
SetEvent
WaitForSingleObject
LoadLibraryA
ExitThread
HeapFree
GetProcessHeap
HeapAlloc
DeleteFileW
SetFileAttributesW
GetFileAttributesW
GetLogicalDrives
GetProcAddress
SetLastError
lstrlenW
Process32NextW
Module32NextW
Module32FirstW
Process32FirstW
OpenProcess
GetCurrentProcessId
CreateToolhelp32Snapshot
GetModuleHandleW
GetModuleFileNameW
CloseHandle
GetCommandLineW
GetLastError
LoadLibraryW
GlobalFree
GlobalUnlock
FreeLibrary
LoadLibraryExW
Sleep
CreateThread
LockResource
FindResourceW
user32
BeginPaint
DrawIconEx
EndPaint
DrawTextW
GetFocus
GetSysColor
AppendMenuW
CreatePopupMenu
CreateMenu
TrackPopupMenu
CheckMenuRadioItem
GetSubMenu
FillRect
SystemParametersInfoW
GetDlgCtrlID
GetWindow
SetFocus
ReleaseDC
GetWindowDC
GetDC
GetMenu
UnregisterClassW
SetForegroundWindow
LoadIconW
DefWindowProcW
SetProcessDefaultLayout
LoadStringW
GetLastActivePopup
SetCapture
ReleaseCapture
SetCursor
PtInRect
MapWindowPoints
IsWindow
LoadCursorW
SetRect
InvalidateRect
PostMessageW
FindWindowW
LoadMenuW
GetClientRect
GetSystemMetrics
IsIconic
GetSystemMenu
DestroyMenu
GetDesktopWindow
GetWindowRect
SendMessageW
UpdateWindow
GetDlgItem
SetWindowTextW
SetWindowLongW
GetWindowLongW
DestroyWindow
EnableWindow
GetParent
GetCapture
gdi32
CreateCompatibleDC
DeleteObject
GetObjectW
SelectObject
BitBlt
CreateFontIndirectW
GetBkColor
StretchBlt
CreateSolidBrush
GetStockObject
DeleteDC
advapi32
RegCloseKey
RegQueryValueExW
LookupAccountSidW
OpenProcessToken
GetTokenInformation
RegSetValueExW
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyExW
shell32
ord68
SHGetFileInfoW
SHGetMalloc
SHGetSpecialFolderLocation
SHGetSpecialFolderPathW
SHGetDesktopFolder
SHGetPathFromIDListW
comctl32
_TrackMouseEvent
ole32
CoInitialize
CoUninitialize
CoCreateInstance
CoInitializeEx
oleaut32
SysAllocString
SafeArrayGetLBound
SafeArrayDestroy
SafeArrayCreate
SysAllocStringLen
SafeArrayRedim
SafeArrayGetElement
SafeArrayPutElement
SysFreeString
SafeArrayGetUBound
SysStringLen
Sections
.text Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE