Static task
static1
Behavioral task
behavioral1
Sample
0472b3430fc73b8b7c705349d8e6da6d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0472b3430fc73b8b7c705349d8e6da6d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0472b3430fc73b8b7c705349d8e6da6d_JaffaCakes118
-
Size
303KB
-
MD5
0472b3430fc73b8b7c705349d8e6da6d
-
SHA1
3bade31e0aad29458ed8c9fd00a470dd5de0350c
-
SHA256
6981f0dc7bf1412961144490b24f430abdd364840cc008b0442f25673f0704f5
-
SHA512
428331f661467b37dd69a785f87653a3068abf3366049cbe2c387ccba13a74056fe8caa57332d928d0562f8bca98f6553707ca9bfc468f073c1d581690e42101
-
SSDEEP
6144:mjgmf/ocAs+g850FB5FnT6zBfBEPppLyFGROzlhDpabGdqYymbo7H:mjvX+KuVayFGRghEE2b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0472b3430fc73b8b7c705349d8e6da6d_JaffaCakes118
Files
-
0472b3430fc73b8b7c705349d8e6da6d_JaffaCakes118.exe windows:4 windows x86 arch:x86
727bb84f8b2c81c78cd59b0c1e1aa82e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CreateStreamOnHGlobal
shlwapi
SHDeleteKeyW
PathRemoveBlanksW
PathFindFileNameW
PathFileExistsW
PathStripPathW
PathIsUNCServerShareW
PathUnquoteSpacesW
PathRemoveFileSpecW
SHDeleteEmptyKeyW
PathAppendW
kernel32
LockResource
LeaveCriticalSection
CreateFileW
ResetEvent
OpenFileMappingW
ReleaseMutex
GlobalUnlock
FindResourceW
GetSystemInfo
LocalUnlock
GetSystemTimeAsFileTime
LoadResource
CreateDirectoryW
MapViewOfFile
MulDiv
GlobalLock
WideCharToMultiByte
UnmapViewOfFile
UnhandledExceptionFilter
SetLastError
OpenMutexW
FindNextFileW
lstrcpyW
OpenEventW
CreateEventW
IsDebuggerPresent
GetLocalTime
ExpandEnvironmentStringsW
HeapFree
ResumeThread
GlobalFree
GlobalMemoryStatus
FormatMessageW
CreateThread
DeleteCriticalSection
FreeLibrary
FileTimeToSystemTime
SetFilePointer
FindClose
CreateFileMappingW
GetCurrentThreadId
SetUnhandledExceptionFilter
ReadFile
CloseHandle
GlobalAlloc
HeapAlloc
LocalFree
LocalLock
WaitForMultipleObjects
OpenProcess
CreateProcessW
GetModuleHandleW
FindFirstFileW
FreeResource
GetProcessHeap
WriteFile
DuplicateHandle
VirtualQuery
SizeofResource
LocalAlloc
WaitForSingleObject
CreateMutexW
EnterCriticalSection
VirtualAllocEx
comctl32
ImageList_DrawEx
ImageList_GetIconSize
ImageList_GetImageCount
_TrackMouseEvent
user32
ReleaseDC
IsRectEmpty
RedrawWindow
GetSystemMetrics
SendMessageW
RemovePropW
DrawFocusRect
FillRect
SetForegroundWindow
RegisterWindowMessageW
IsWindowVisible
GetDC
GetDesktopWindow
IsWindow
GetAncestor
GetParent
DestroyIcon
GetWindowDC
KillTimer
GetWindowTextW
GetWindowThreadProcessId
CreateWindowExW
DefWindowProcW
DestroyCursor
ScreenToClient
SetCursor
GetCursor
GetWindowPlacement
GetNextDlgGroupItem
GetForegroundWindow
ShowScrollBar
IntersectRect
GetKeyState
InflateRect
GetSysColor
GetCursorPos
CallWindowProcW
GetClassInfoW
SetPropW
FindWindowExW
CopyRect
DestroyWindow
MessageBeep
MsgWaitForMultipleObjects
BringWindowToTop
InvalidateRect
GetSysColorBrush
GetIconInfo
GetClientRect
UpdateWindow
PtInRect
GetWindowRect
ClientToScreen
GetDlgItem
SystemParametersInfoW
IsChild
GetPropW
SetWindowPos
LoadBitmapW
SetTimer
SetLayeredWindowAttributes
SetRect
MessageBoxW
LoadCursorW
AttachThreadInput
SetFocus
GetWindowLongW
CreateIconIndirect
PostMessageW
PeekMessageW
FrameRect
SetWindowLongW
EnableScrollBar
EnableWindow
FindWindowW
LoadIconW
CopyImage
LoadImageW
MapDialogRect
GetFocus
DrawTextW
OffsetRect
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
advapi32
RegEnumValueW
GetNamedSecurityInfoW
SetNamedSecurityInfoW
GetSidSubAuthority
RegEnumKeyExW
RegQueryInfoKeyW
GetAclInformation
AllocateAndInitializeSid
RegSetValueExW
InitializeSecurityDescriptor
AddAce
GetLengthSid
SetSecurityDescriptorDacl
RegQueryValueW
CryptGenRandom
RegCloseKey
LogonUserW
InitializeAcl
GetUserNameW
SetSecurityDescriptorSacl
FreeSid
RegOpenKeyExW
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegQueryValueExW
AddAccessAllowedAce
GetSidIdentifierAuthority
RegCreateKeyExW
RegDeleteValueW
CryptAcquireContextW
ImpersonateLoggedOnUser
SetEntriesInAclW
GetAce
GetSidSubAuthorityCount
CryptReleaseContext
gdi32
SetBkMode
GetPixel
LineTo
GetTextFaceW
DeleteObject
StretchBlt
Rectangle
CreateFontIndirectW
TextOutW
GetStockObject
SetTextColor
GetDeviceCaps
CreateDIBSection
ExcludeClipRect
CreateSolidBrush
SetTextJustification
ExtTextOutW
GetTextMetricsW
SelectObject
CreateCompatibleDC
DeleteDC
Polygon
SetPixel
CreatePen
GetObjectW
SetStretchBltMode
MoveToEx
GetCurrentObject
BitBlt
CreateCompatibleBitmap
GetTextExtentPoint32W
SetBkColor
GetDIBits
shell32
SHCreateDirectoryExW
ShellExecuteW
SHGetFolderPathW
oleaut32
VariantTimeToSystemTime
SysAllocString
SysFreeString
OleLoadPicture
SystemTimeToVariantTime
msimg32
AlphaBlend
GradientFill
userenv
GetProfileType
UnloadUserProfile
ExpandEnvironmentStringsForUserW
GetDefaultUserProfileDirectoryW
UnregisterGPNotification
gpedit
DllGetClassObject
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 259KB - Virtual size: 258KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ