c:\olh\pmm
Static task
static1
Behavioral task
behavioral1
Sample
b099f64ffba9046d90e63feb4c56fa37_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b099f64ffba9046d90e63feb4c56fa37_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b099f64ffba9046d90e63feb4c56fa37_JaffaCakes118
-
Size
592KB
-
MD5
b099f64ffba9046d90e63feb4c56fa37
-
SHA1
0622b8f97b7080661852d700ed662ac5948afe76
-
SHA256
6806ae0a88f580c87afbb4c16b033d11ae8cfcdeb190d543a44bbe14084aee74
-
SHA512
dc7006ac7b2bde9ee513db0337f71bde31c75755f086942e0dab9a1223b2e36b2a141f10fed317f72fb660ed766dc53ab12aed597e19aa12da849bfb36774e67
-
SSDEEP
12288:4QGpOD0k+lKOK0l0rCCb59NNVVRpzZLGU7hcWUN3rUHqIZTa1Qlj:TGpq0kbOfITvzHZLlhcWUFYqIFaG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b099f64ffba9046d90e63feb4c56fa37_JaffaCakes118
Files
-
b099f64ffba9046d90e63feb4c56fa37_JaffaCakes118.exe windows:4 windows x86 arch:x86
bd612a64666c2775efe8a0102257f5ed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
IsUrlCacheEntryExpiredW
GopherGetLocatorTypeA
InternetGoOnline
SetUrlCacheEntryGroupW
ShowCertificate
comctl32
ImageList_LoadImageW
ImageList_GetImageRect
DrawStatusTextW
DrawStatusTextA
InitCommonControlsEx
CreatePropertySheetPageW
DrawStatusText
ImageList_DragShowNolock
user32
ActivateKeyboardLayout
GetMessageTime
IsWindow
CountClipboardFormats
MessageBoxIndirectW
SubtractRect
RegisterClassExA
SetActiveWindow
CreateWindowStationA
ChildWindowFromPoint
RegisterClassA
SetSysColors
MessageBoxW
CharUpperW
RegisterDeviceNotificationW
ClientToScreen
EndDeferWindowPos
EnumDisplayDevicesA
IsDialogMessageW
GetAltTabInfo
GetActiveWindow
MonitorFromWindow
DestroyWindow
SendMessageA
SetForegroundWindow
DestroyAcceleratorTable
ToUnicodeEx
GetDlgItemInt
GetSubMenu
SetDeskWallpaper
GetKeyNameTextW
WINNLSGetIMEHotkey
CharNextW
SetMenuItemInfoW
UnregisterDeviceNotification
BroadcastSystemMessageW
GetInputDesktop
DefWindowProcW
GetUserObjectInformationA
ClipCursor
PtInRect
GetMenuDefaultItem
SetWindowTextW
CreateDialogIndirectParamW
ShowCursor
GetWindowLongW
EnumDisplaySettingsExW
SendNotifyMessageA
GetWindowRect
CharUpperBuffA
ShowWindow
ToAsciiEx
DdeReconnect
CreateIconFromResource
GetWindowModuleFileNameW
OpenIcon
SetClipboardData
ChangeClipboardChain
CreateWindowExW
DrawFocusRect
DlgDirSelectExW
InternalGetWindowText
InflateRect
GetClipboardSequenceNumber
NotifyWinEvent
SetWindowsHookExW
GetSystemMetrics
GetMessageW
SetMessageExtraInfo
SetLastErrorEx
gdi32
GetCharWidthA
GetDeviceCaps
GetPath
DeleteDC
RemoveFontResourceW
SetPixel
gdiPlaySpoolStream
GetEnhMetaFileDescriptionA
CreateDCA
SetBkColor
GetGlyphOutlineA
CreateScalableFontResourceA
CreateICA
OffsetClipRgn
GetCharABCWidthsW
GetROP2
AnimatePalette
GetGraphicsMode
SetBkMode
TranslateCharsetInfo
GetPixelFormat
RectVisible
CreatePalette
SetMetaFileBitsEx
GetEnhMetaFilePaletteEntries
GetStretchBltMode
GetWorldTransform
GetObjectW
Polyline
advapi32
RegCloseKey
CryptImportKey
LookupAccountSidW
LogonUserW
RegQueryMultipleValuesW
DuplicateTokenEx
LookupSecurityDescriptorPartsW
InitializeSecurityDescriptor
CryptSetKeyParam
LookupAccountNameA
AbortSystemShutdownW
AbortSystemShutdownA
RegQueryInfoKeyW
CreateServiceA
RegQueryMultipleValuesA
LookupSecurityDescriptorPartsA
CryptGenKey
RegOpenKeyW
RegQueryValueExA
RegSaveKeyW
LookupPrivilegeValueA
kernel32
GetCurrentThread
HeapAlloc
FlushFileBuffers
InterlockedExchange
OpenMutexA
GetConsoleOutputCP
LoadLibraryA
FileTimeToSystemTime
SetUnhandledExceptionFilter
EnterCriticalSection
GetProcessHeap
QueryPerformanceCounter
CompareStringW
GetCommandLineW
ReadFile
GetTimeFormatA
HeapSize
TlsSetValue
WriteConsoleW
SetFilePointer
MapViewOfFile
SetLastError
GetACP
SetConsoleCtrlHandler
GetCommandLineA
UnhandledExceptionFilter
GetCurrentProcessId
IsDebuggerPresent
GetVersionExA
GetConsoleCP
CreateThread
CreateMutexA
GetCurrentProcess
FreeEnvironmentStringsA
GetDateFormatA
GetStringTypeA
GetDiskFreeSpaceA
CreateFileA
GetModuleFileNameA
LCMapStringA
GetSystemTimeAsFileTime
RtlUnwind
GetStartupInfoA
GetTickCount
InterlockedDecrement
GlobalDeleteAtom
WriteFile
GetEnvironmentStringsW
Sleep
GetEnvironmentStrings
CompareStringA
GetCPInfo
HeapReAlloc
lstrcpyn
GetCurrentThreadId
GetTimeZoneInformation
IsValidLocale
MultiByteToWideChar
EnumSystemLocalesA
SetEnvironmentVariableA
TerminateProcess
DeleteCriticalSection
TlsFree
FindResourceW
WideCharToMultiByte
VirtualFree
VirtualAlloc
GetStdHandle
GetLocaleInfoW
HeapFree
WriteConsoleA
ExitProcess
LeaveCriticalSection
GetConsoleMode
GlobalAlloc
CloseHandle
GetUserDefaultLCID
InterlockedIncrement
GetStartupInfoW
GetLastError
InitializeCriticalSection
GetModuleFileNameW
GetProcessShutdownParameters
TlsGetValue
GetModuleHandleA
VirtualQuery
IsValidCodePage
GetStringTypeW
FreeEnvironmentStringsW
GetProcAddress
GetOEMCP
HeapDestroy
FindResourceExA
GetLocaleInfoA
LCMapStringW
SetStdHandle
GetFileType
SetHandleCount
FreeLibrary
TlsAlloc
HeapCreate
comdlg32
LoadAlterBitmap
GetFileTitleA
GetSaveFileNameA
Sections
.text Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 251KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ