e:\projects\windows\BrowserPasswordDecryptor\Release\BrowserPasswordDecryptor.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a1ec020fdefdce06790b7270da78e4a9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a1ec020fdefdce06790b7270da78e4a9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a1ec020fdefdce06790b7270da78e4a9_JaffaCakes118
-
Size
1011KB
-
MD5
a1ec020fdefdce06790b7270da78e4a9
-
SHA1
7a236160846c6d3f451aa3515cb69e145929dae5
-
SHA256
1c475214a622544802c53ce3ae9fcfb1aec6df9928ea0d0fa4872514ba23daee
-
SHA512
c03ed7424439d236bed1c1e3ea49962ae13f10473e4be2a959608d9402de22ca85775f1f163f282396702a0fdab02e4422d412e6b13f26d9fa1fde3ffbd03dd6
-
SSDEEP
12288:7MzoTGnxhbL7Rm4/R9esVDFXVN55nXr9POR1HB0rHFaIW8BBuoKKdwmO8Mk6Y:YcKnPtuM/hXr9m1HB0wIW8nO8MZY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a1ec020fdefdce06790b7270da78e4a9_JaffaCakes118
Files
-
a1ec020fdefdce06790b7270da78e4a9_JaffaCakes118.exe windows:5 windows x86 arch:x86
0a50804475f8e1bffe3dee01be63acfb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitThread
CreateThread
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
HeapCreate
VirtualFree
GetStdHandle
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
SetHandleCount
RaiseException
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CompareStringW
SetEnvironmentVariableA
FindResourceA
RtlUnwind
GetStartupInfoA
HeapReAlloc
GetFileTime
GetFileSizeEx
FileTimeToLocalFileTime
SetErrorMode
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GlobalFlags
GetModuleHandleW
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
FileTimeToSystemTime
GetThreadLocale
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
InterlockedExchange
FreeResource
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
GetModuleFileNameW
AreFileApisANSI
GetSystemTime
GetCurrentProcessId
DeleteFileW
GetCurrentThreadId
DeleteCriticalSection
GetDiskFreeSpaceA
GetDiskFreeSpaceW
EnterCriticalSection
LockFileEx
GetTempPathW
FlushFileBuffers
MultiByteToWideChar
CreateFileW
ReadFile
GetFileAttributesW
LeaveCriticalSection
Sleep
LoadLibraryW
InitializeCriticalSection
WriteFile
FormatMessageA
GetSystemTimeAsFileTime
GetTickCount
LockFile
UnlockFile
QueryPerformanceCounter
InterlockedDecrement
InterlockedIncrement
SetEndOfFile
SetFilePointer
GetFileSize
CreateFileA
GetFullPathNameA
GetFullPathNameW
SetDllDirectoryA
WaitForSingleObject
CreateProcessA
DeleteFileA
CopyFileA
GetTempPathA
LocalFree
lstrcpynA
lstrcmpA
GetCommandLineA
ExitProcess
SizeofResource
WideCharToMultiByte
lstrlenA
LoadLibraryA
SetLastError
FreeLibrary
CloseHandle
GetVersionExA
OutputDebugStringA
GetModuleHandleA
LockResource
GetProcAddress
GetLastError
GetFileAttributesA
GetProcessHeap
GetCurrentThread
HeapFree
GetCurrentProcess
HeapAlloc
LoadResource
GetFileType
user32
MessageBeep
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
GetSysColorBrush
UnregisterClassA
DestroyMenu
GetMessageA
TranslateMessage
ValidateRect
GetWindowThreadProcessId
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
CharUpperA
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
MessageBoxA
CreateWindowExA
GetSysColor
EnableWindow
LoadImageA
SendMessageA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowPos
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
EndPaint
BeginPaint
GetWindowDC
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
CopyRect
IsWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
RegisterClipboardFormatA
PostThreadMessageA
GetTopWindow
GetClientRect
LoadIconA
GetSystemMenu
AppendMenuA
IsIconic
GetSystemMetrics
DrawIcon
LoadCursorA
ReleaseCapture
RedrawWindow
InvalidateRect
SetWindowLongA
PtInRect
GetParent
SetCapture
SetCursor
DestroyIcon
PostMessageA
GetCursorPos
GetWindowLongA
OffsetRect
DrawStateA
InflateRect
GetCapture
GetIconInfo
SetRectEmpty
DrawEdge
WindowFromPoint
GetWindowRect
GetNextDlgGroupItem
ClientToScreen
UnhookWindowsHookEx
GetSubMenu
GetMenuItemCount
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuState
GetMenuItemID
gdi32
GetBkColor
GetTextColor
GetRgnBox
GetMapMode
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateRectRgnIndirect
CreateBitmap
GetDeviceCaps
SetDIBitsToDevice
SelectObject
SetStretchBltMode
CreateFontIndirectA
GetObjectA
CreateSolidBrush
CreateFontA
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
GetWindowExtEx
DeleteObject
GetStockObject
GetViewportExtEx
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
CryptGetHashParam
OpenProcessToken
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
CredFree
CredEnumerateA
RegEnumValueA
CryptHashData
RegCloseKey
AdjustTokenPrivileges
CryptDestroyHash
GetUserNameA
CryptCreateHash
RegOpenKeyExA
CryptAcquireContextA
RegCreateKeyExA
LookupPrivilegeValueA
CryptReleaseContext
RegQueryValueExA
RegSetValueExA
shell32
SHGetFolderPathA
ShellExecuteA
comctl32
InitCommonControlsEx
_TrackMouseEvent
shlwapi
PathFindFileNameA
PathRemoveFileSpecW
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CoInitializeEx
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
CoCreateInstance
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CLSIDFromString
CoInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysStringLen
SysFreeString
SysAllocStringByteLen
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
GetErrorInfo
winhttp
WinHttpSendRequest
WinHttpConnect
WinHttpCloseHandle
WinHttpReadData
WinHttpOpenRequest
WinHttpOpen
WinHttpQueryDataAvailable
WinHttpReceiveResponse
crypt32
CryptUnprotectData
Sections
.text Size: 624KB - Virtual size: 623KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 214KB - Virtual size: 214KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ