c:\weateslj\nroeel\lfrgvttez\xex
Static task
static1
Behavioral task
behavioral1
Sample
bd7afc8c61b6f3d961b27126e9955fbc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bd7afc8c61b6f3d961b27126e9955fbc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bd7afc8c61b6f3d961b27126e9955fbc_JaffaCakes118
-
Size
604KB
-
MD5
bd7afc8c61b6f3d961b27126e9955fbc
-
SHA1
121988de7bc100c1696676e479f19d7e3d93754a
-
SHA256
fdc9e653fe114b5117c76436c5a2732124df49d5abc28720edc6b36c2a2bf243
-
SHA512
97371620c2b67020d8f70e54313a2f4136599b35022abad91b0236c9a9eef5f538219fcb20d3ebf3c74d06d7a5183a1f9e9c92f857326b4adf7acfe7e0976ec1
-
SSDEEP
12288:2EjOKioB+hYcmI/nBDaHj/+e4oTgDobsXsLBEJB82HkMS97:2HKiA6YcmI/BDaT+e4oTClctcS2Et
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd7afc8c61b6f3d961b27126e9955fbc_JaffaCakes118
Files
-
bd7afc8c61b6f3d961b27126e9955fbc_JaffaCakes118.exe windows:4 windows x86 arch:x86
c5526759274f07b64e3ae90f7833d284
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
CryptSetProviderA
RegSaveKeyW
CryptSetKeyParam
LookupAccountSidW
LookupPrivilegeNameW
CryptGetProvParam
RegEnumValueA
CryptGetKeyParam
CryptVerifySignatureA
RegReplaceKeyA
RegQueryValueW
ReportEventA
RegCreateKeyExW
CryptGetDefaultProviderA
StartServiceW
CryptSetProvParam
RegOpenKeyA
CryptCreateHash
RegQueryValueExA
GetUserNameW
RegEnumKeyW
LookupAccountNameA
gdi32
ColorMatchToTarget
GetGraphicsMode
GetClipBox
GetMetaFileBitsEx
GetCharWidth32A
AbortDoc
StartDocW
StartDocA
StrokeAndFillPath
GetWindowExtEx
CreatePatternBrush
GetTextColor
GetPolyFillMode
PlgBlt
DPtoLP
SetICMProfileA
DeviceCapabilitiesExW
CreateBitmapIndirect
PlayEnhMetaFileRecord
GetEnhMetaFileDescriptionW
StartPage
PolyPolygon
EndDoc
PathToRegion
comctl32
ImageList_DragEnter
ImageList_Create
MakeDragList
ImageList_SetDragCursorImage
CreatePropertySheetPage
InitCommonControlsEx
ImageList_LoadImage
_TrackMouseEvent
CreateStatusWindow
ImageList_Add
ImageList_DragShowNolock
user32
EnableWindow
DdeCmpStringHandles
OpenWindowStationW
ShowOwnedPopups
MessageBoxW
AttachThreadInput
UnregisterClassA
LoadAcceleratorsW
CheckRadioButton
GetMenuItemRect
DefWindowProcW
GetMenuInfo
TileChildWindows
LoadAcceleratorsA
CreateWindowExA
GetFocus
LoadIconA
GetKeyboardState
VkKeyScanA
RegisterClassW
DestroyWindow
MessageBoxIndirectW
GetDlgItemInt
DrawStateW
GetWindow
RegisterClassExA
GetGuiResources
SwapMouseButton
SetUserObjectInformationW
GetKeyState
OpenDesktopA
RegisterClassA
ReleaseCapture
ShowWindow
GetClassNameA
shell32
ExtractIconExA
wininet
SetUrlCacheGroupAttributeA
GopherCreateLocatorW
InternetOpenW
InternetSetDialStateA
kernel32
GetCurrentProcess
GetSystemTimeAsFileTime
GetStartupInfoW
InterlockedDecrement
OpenMutexA
FoldStringA
MoveFileExA
CreateDirectoryExW
GetCommandLineW
GetDiskFreeSpaceW
GetProcessHeaps
GlobalUnlock
MultiByteToWideChar
GetTickCount
CloseHandle
RtlUnwind
GetWindowsDirectoryW
EnumDateFormatsW
TlsAlloc
GetModuleHandleA
GetFileType
GetModuleFileNameW
VirtualQuery
HeapReAlloc
GetDateFormatW
GetThreadPriorityBoost
GetStartupInfoA
GetLocalTime
AllocConsole
lstrcmpA
lstrlen
OpenEventA
GetPrivateProfileIntA
LCMapStringA
WritePrivateProfileSectionW
TlsSetValue
HeapFree
lstrcmp
GetCPInfo
CreateThread
EnumCalendarInfoW
VirtualAlloc
FindResourceExA
VirtualFree
InterlockedExchange
GetTimeZoneInformation
InterlockedIncrement
OpenWaitableTimerA
FreeEnvironmentStringsW
GlobalReAlloc
FindClose
LoadLibraryA
FindFirstFileW
GetStringTypeA
SetLastError
CompareStringA
GetCurrentProcessId
SetConsoleTitleA
GetEnvironmentStringsW
CreateNamedPipeA
WriteConsoleOutputCharacterA
LCMapStringW
GlobalFlags
FreeEnvironmentStringsA
GetModuleFileNameA
FlushFileBuffers
GetLongPathNameW
GetLastError
VirtualAllocEx
IsDebuggerPresent
GetCommandLineA
GetCurrentThread
ReadFile
GetStringTypeW
MoveFileExW
LocalFileTimeToFileTime
GetProcAddress
InterlockedCompareExchange
GetStdHandle
GetSystemTime
TlsFree
SetFilePointer
GetEnvironmentStrings
ExitProcess
EnterCriticalSection
lstrlenA
SetHandleCount
lstrcatW
TlsGetValue
SetStdHandle
HeapCreate
GlobalFix
SetEnvironmentVariableA
UnhandledExceptionFilter
GetPrivateProfileStringW
GetCurrentThreadId
WideCharToMultiByte
ResetEvent
IsBadWritePtr
QueryPerformanceCounter
CreateMutexA
TerminateProcess
GetVersion
InitializeCriticalSection
GlobalLock
WriteProfileStringW
WritePrivateProfileStructA
WriteFileEx
HeapAlloc
WriteFile
LeaveCriticalSection
DeleteCriticalSection
GetCurrencyFormatA
HeapDestroy
FindResourceA
CompareStringW
Sections
.text Size: 156KB - Virtual size: 153KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ