e:\projects\windows\IMPasswordDecryptor\Release\IMPasswordDecryptor.pdb
Static task
static1
Behavioral task
behavioral1
Sample
03645ef81065af619d4f5a569e6853f1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03645ef81065af619d4f5a569e6853f1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
03645ef81065af619d4f5a569e6853f1_JaffaCakes118
-
Size
1.3MB
-
MD5
03645ef81065af619d4f5a569e6853f1
-
SHA1
6e5316bb85b7397e7cc446c0b9e5d85d50c21a88
-
SHA256
43ecca2b71003da726a1a807d48bbf688b3f23e9a61da5a690024d5b3ac3a35a
-
SHA512
dbe3caa31a892aaf4453bfe8e9c2bd349217875014728361f03b168dd6eafc8496a5f072ff9d9b570c337875d01802122b76c472efc58f790871f0a8205e9f0c
-
SSDEEP
24576:AO2nVOKUFSS27i9jkcVqO79UJVUrvRlQAQBv7a0r/WMU55TITYCi0zLiwn5/UU:cnVIFSSV9jkcDRlE2gtbzuw5/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03645ef81065af619d4f5a569e6853f1_JaffaCakes118
Files
-
03645ef81065af619d4f5a569e6853f1_JaffaCakes118.exe windows:5 windows x86 arch:x86
b1927d3957b44bcc81c0228581c08205
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
ExitThread
CreateThread
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
HeapCreate
VirtualFree
GetStdHandle
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
SetHandleCount
GetFileType
GetStringTypeA
GetSystemInfo
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CompareStringW
SetEnvironmentVariableA
VirtualAlloc
VirtualProtect
RaiseException
RtlUnwind
HeapReAlloc
GetStartupInfoA
GetSystemTimeAsFileTime
GetFileTime
GetFileSizeEx
FileTimeToLocalFileTime
GetTickCount
SetErrorMode
GetFullPathNameA
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GlobalFlags
InterlockedIncrement
GetModuleHandleW
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
FileTimeToSystemTime
GetThreadLocale
CreateEventA
SuspendThread
SetEvent
SetThreadPriority
GetCurrentProcessId
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
MulDiv
lstrlenA
InterlockedDecrement
GetModuleFileNameW
MultiByteToWideChar
WriteFile
ResumeThread
WriteProcessMemory
LocalFree
GetExitCodeThread
LocalAlloc
VirtualAllocEx
ReadProcessMemory
VirtualFreeEx
CreateRemoteThread
WaitForSingleObject
GetVolumeInformationA
GetDriveTypeA
FindClose
FindNextFileA
FindFirstFileA
UnmapViewOfFile
VirtualQuery
MapViewOfFile
CreateFileMappingA
CopyFileA
GetTempPathA
ReadFile
GetFileSize
CreateFileA
GetWindowsDirectoryA
GetCommandLineA
ExitProcess
SizeofResource
WideCharToMultiByte
LoadLibraryA
SetLastError
FreeLibrary
CloseHandle
GetVersionExA
OutputDebugStringA
GetModuleHandleA
LockResource
GetProcAddress
GetLastError
GetFileAttributesA
OpenProcess
GetProcessHeap
GetCurrentThread
HeapFree
GetCurrentProcess
FindResourceA
HeapAlloc
LoadResource
GetStringTypeW
user32
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowPos
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
EndPaint
BeginPaint
GetWindowDC
ScreenToClient
SetWindowsHookExA
DrawTextExA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
CopyRect
IsWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetSysColor
IsChild
WinHelpA
SendDlgItemMessageA
UnhookWindowsHookEx
ClientToScreen
GetNextDlgGroupItem
GetWindowRect
WindowFromPoint
DrawEdge
SetRectEmpty
GetIconInfo
GetCapture
InflateRect
DrawStateA
OffsetRect
GetWindowLongA
GetCursorPos
PostMessageA
DestroyIcon
SetCursor
SetCapture
GetParent
PtInRect
SetWindowLongA
InvalidateRect
RedrawWindow
ReleaseCapture
LoadCursorA
DrawIcon
GetSystemMetrics
IsIconic
AppendMenuA
GetSystemMenu
LoadIconA
GetClientRect
RegisterWindowMessageA
SendMessageA
LoadImageA
EnableWindow
PostThreadMessageA
RegisterClipboardFormatA
CharUpperA
MessageBeep
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
GetSysColorBrush
UnregisterClassA
DestroyMenu
GetMessageA
TranslateMessage
ValidateRect
GetWindowThreadProcessId
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
GrayStringA
IsDialogMessageA
gdi32
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateRectRgnIndirect
CreateBitmap
GetDeviceCaps
SetDIBitsToDevice
SelectObject
SetStretchBltMode
CreateFontIndirectA
GetObjectA
CreateSolidBrush
CreateFontA
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
DeleteObject
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
OpenProcessToken
OpenThreadToken
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
DuplicateToken
SetThreadToken
RegQueryValueExA
RegEnumKeyExA
CryptHashData
RegCloseKey
AdjustTokenPrivileges
CryptDestroyHash
LookupAccountNameA
GetUserNameA
CryptCreateHash
RegOpenKeyExA
CryptAcquireContextA
RegCreateKeyExA
LookupPrivilegeValueA
CryptReleaseContext
LookupAccountSidA
RegSetValueExA
GetTokenInformation
CryptGetHashParam
shell32
ShellExecuteA
SHGetFolderPathA
comctl32
_TrackMouseEvent
InitCommonControlsEx
shlwapi
PathFindExtensionA
PathStripToRootA
PathIsUNCA
PathFindFileNameA
PathRemoveFileSpecW
oledlg
ord8
ole32
CoInitializeEx
CoCreateInstance
CoUninitialize
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
OleIsCurrentClipboard
CoTaskMemFree
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
oleaut32
VariantChangeType
SysAllocStringByteLen
SysFreeString
SysStringLen
VariantInit
SysAllocStringLen
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
VariantClear
winhttp
WinHttpOpen
WinHttpSendRequest
WinHttpReadData
WinHttpOpenRequest
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpCloseHandle
WinHttpConnect
psapi
EnumProcesses
GetModuleBaseNameA
crypt32
CryptUnprotectData
Sections
.text Size: 277KB - Virtual size: 277KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 920KB - Virtual size: 920KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ