Static task
static1
Behavioral task
behavioral1
Sample
47a2f78579f8930ae9cb1ccfbceef9c5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
47a2f78579f8930ae9cb1ccfbceef9c5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
47a2f78579f8930ae9cb1ccfbceef9c5_JaffaCakes118
-
Size
332KB
-
MD5
47a2f78579f8930ae9cb1ccfbceef9c5
-
SHA1
6eaca7b7357886b892495c636eb8d9eed02497c2
-
SHA256
6113c894b01e0323aac6359d91912451dd9fcbf094313dc03ce04ec12a360c6b
-
SHA512
1afe4b00d7d1d2618371ac6b4d2c93d2c5daecc35791746014c1047d3766647fdd7bf3947c9900cdffe190bb615427e0ea8468cd24932ee70da9133ff28e3144
-
SSDEEP
6144:t9kamsMrzUgolh7wzy85fM1iLE4RumYoTBJE6GXSS:UamsMrzWE0CRumYoTrEPP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 47a2f78579f8930ae9cb1ccfbceef9c5_JaffaCakes118
Files
-
47a2f78579f8930ae9cb1ccfbceef9c5_JaffaCakes118.exe windows:4 windows x86 arch:x86
f7687591db5ff3208bd39f22a8f5f102
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFindFileNameA
PathFileExistsA
PathFindExtensionA
SHGetValueA
advapi32
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegOpenKeyA
RegDeleteKeyA
kernel32
GetVersionExA
lstrcmpW
GlobalFindAtomA
GetModuleFileNameW
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
WritePrivateProfileStringA
GlobalFlags
SetErrorMode
GetCPInfo
GetOEMCP
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
VirtualAlloc
VirtualQuery
HeapReAlloc
ExitProcess
GetCommandLineA
GetProcessHeap
GetStartupInfoA
WriteConsoleW
GetFileType
GetStdHandle
RtlUnwind
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
GetConsoleCP
GetConsoleMode
Sleep
GetACP
LCMapStringA
LCMapStringW
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
DebugBreak
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
GetStringTypeA
GetStringTypeW
ReleaseSemaphore
CreateSemaphoreA
GlobalGetAtomNameA
GetThreadLocale
SetEndOfFile
FlushFileBuffers
GetCurrentProcessId
GlobalAddAtomA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalDeleteAtom
GetModuleHandleA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
MulDiv
WaitForSingleObject
RaiseException
LocalAlloc
SetFilePointer
WriteFile
ReadFile
CreateFileA
FreeResource
LocalFree
SetLastError
GetModuleFileNameA
GetCurrentProcess
GetCurrentThreadId
FreeLibrary
GetVersion
CompareStringA
InterlockedExchange
MultiByteToWideChar
lstrlenA
CloseHandle
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GetProcAddress
LoadLibraryA
GetLastError
user32
BeginPaint
EndPaint
DestroyMenu
UnregisterClassA
ReleaseDC
GetSysColorBrush
ShowWindow
IsDialogMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
GrayStringA
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
GetLastActivePopup
MessageBoxA
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
PostQuitMessage
PostMessageA
GetMenuState
DrawTextExA
DrawTextA
TabbedTextOutA
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
SendMessageA
GetKeyState
PeekMessageA
ValidateRect
GetParent
GetClassNameA
GetSystemMetrics
RegisterWindowMessageA
GetWindowThreadProcessId
SetWindowTextA
GetClientRect
EnableWindow
GetWindowTextA
GetCursorPos
ClientToScreen
LoadCursorA
GetDC
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
SelectObject
GetStockObject
ExtTextOutA
GetClipBox
CreateBitmap
GetDeviceCaps
TextOutA
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
DeleteObject
GetObjectA
SetBkColor
SetTextColor
Escape
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
oleaut32
VariantClear
VariantInit
VariantChangeType
Sections
.text Size: 240KB - Virtual size: 239KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 744B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ