f:\w
Static task
static1
Behavioral task
behavioral1
Sample
47cbedd647aff4de52490c4d7d7714a4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
47cbedd647aff4de52490c4d7d7714a4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
47cbedd647aff4de52490c4d7d7714a4_JaffaCakes118
-
Size
596KB
-
MD5
47cbedd647aff4de52490c4d7d7714a4
-
SHA1
df1407474e8882203d87d152a5f3dd7383bd0392
-
SHA256
a4088d579ae41ad7a631696fa9ea637c073e2e79de1c8bda4c6166c0b32ac93c
-
SHA512
402465ef9825a4d5dab9da5b06333637e49fa999f84cd23caeb94c12329f0c053654870c3dd0e19254252f316328d3fa1812ec47257eb9259acab6dab1039d7d
-
SSDEEP
12288:0t0LugVgZlN46MBQxoAXMyZe+VG5i8uiqkG:iIuOY46MB4owHG5i8nqk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 47cbedd647aff4de52490c4d7d7714a4_JaffaCakes118
Files
-
47cbedd647aff4de52490c4d7d7714a4_JaffaCakes118.exe windows:4 windows x86 arch:x86
bf47801840a715e0182a77b227a5e4cb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
ShellExecuteA
SheSetCurDrive
DuplicateIcon
DragQueryFileA
kernel32
ReleaseSemaphore
DeleteAtom
CreateFileA
OpenWaitableTimerA
GetCommandLineW
FindResourceA
WaitNamedPipeA
SetConsoleTitleW
WideCharToMultiByte
GlobalLock
SetConsoleTitleA
GetPrivateProfileSectionA
FlushFileBuffers
InterlockedDecrement
ReadFile
OpenMutexA
GetFileType
RaiseException
CompareStringW
SetEnvironmentVariableA
ExitProcess
EnumDateFormatsExA
GetLocalTime
GetEnvironmentStrings
HeapAlloc
InterlockedExchange
GlobalUnfix
FreeEnvironmentStringsA
GetStartupInfoA
VirtualQuery
DeleteCriticalSection
GetPrivateProfileStringW
GetTickCount
GetModuleFileNameA
CompareStringA
QueryPerformanceCounter
CloseHandle
SetLastError
GetFileAttributesExA
CreateDirectoryA
FindFirstFileExA
CreateMutexA
GetModuleHandleA
FreeLibrary
LoadLibraryA
WriteConsoleOutputAttribute
GetProfileStringA
CreateRemoteThread
GetStdHandle
GetCurrentProcess
RemoveDirectoryA
GetEnvironmentStringsW
LCMapStringA
RtlUnwind
GetFileAttributesW
CreateProcessW
GetStringTypeW
VirtualAlloc
VirtualUnlock
GetStringTypeA
TlsFree
SetFilePointer
FindNextChangeNotification
GetProcAddress
GetSystemDirectoryW
GetVolumeInformationW
OpenEventW
GetMailslotInfo
GetLastError
VirtualFree
EnumResourceLanguagesA
IsBadWritePtr
GlobalCompact
FreeEnvironmentStringsW
CreateFileMappingW
MapViewOfFile
UnhandledExceptionFilter
HeapReAlloc
WaitForMultipleObjectsEx
GetCurrentThread
GetCommandLineA
InitializeCriticalSection
GetExitCodeThread
TlsGetValue
GetCurrentProcessId
GetLogicalDriveStringsA
EnumCalendarInfoExA
GetTempPathA
TerminateProcess
GetSystemTimeAsFileTime
FindAtomW
LeaveCriticalSection
SetFileTime
SetComputerNameW
EnterCriticalSection
lstrcatW
OutputDebugStringA
FreeResource
MultiByteToWideChar
GetComputerNameA
lstrcpynA
TlsAlloc
TlsSetValue
HeapFree
GetTimeZoneInformation
GetThreadTimes
GetCurrentThreadId
EnumTimeFormatsW
SetSystemTime
SetHandleCount
LocalReAlloc
LCMapStringW
SetStdHandle
GetCompressedFileSizeA
HeapDestroy
GetCPInfo
GetStartupInfoW
WriteFile
GetLocaleInfoW
GetSystemTime
WriteConsoleW
OpenSemaphoreW
OpenFile
VirtualProtect
InterlockedIncrement
IsDebuggerPresent
HeapCreate
GetVersion
CopyFileExA
SetConsoleMode
GetModuleFileNameW
comctl32
ImageList_Copy
ImageList_DrawEx
ImageList_SetFlags
InitCommonControlsEx
ImageList_GetIconSize
ImageList_Replace
user32
CharPrevExA
ScreenToClient
DdeSetQualityOfService
GetPropW
MessageBoxA
GetOpenClipboardWindow
SubtractRect
GetClassNameW
DrawTextExW
ShowWindow
GetAsyncKeyState
GetMenuContextHelpId
CreateCursor
SetWindowLongW
RegisterClassExA
GetKBCodePage
MonitorFromRect
GetActiveWindow
DdeSetUserHandle
DefWindowProcA
FindWindowExW
SetDlgItemTextW
OpenDesktopW
CreateWindowExA
UnpackDDElParam
DestroyWindow
RegisterClassA
SetScrollInfo
LoadStringW
advapi32
LookupAccountNameA
RegDeleteKeyA
RegSetValueA
CryptSignHashW
LookupSecurityDescriptorPartsW
Sections
.text Size: 148KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 250KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ