Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_472cf80fffa4084c50c8211d5a1f4e12.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_472cf80fffa4084c50c8211d5a1f4e12.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_472cf80fffa4084c50c8211d5a1f4e12
-
Size
191KB
-
MD5
472cf80fffa4084c50c8211d5a1f4e12
-
SHA1
6d212e4e6faf922b1294c049222f37018037127c
-
SHA256
6326507e993160708cf10b327b4effc6f41507731ed48cf88c55a5ea523a60c4
-
SHA512
5a27950e9944da223de8ae8fd128910460cd0704a6e62830ba6295bbce5cbfdba8504343c7b9ea82c670f0b49164a6c60f9b657e70a007e0429d03d18e45f39d
-
SSDEEP
3072:eGWrA6ctAurG1u5pArS74oyqoVdRM5Km3D1CxqDinp6Pu6zzQtfeuGaTuyXUMJxp:crTkrGCa9fVQ5npf2APuastfeqTrUy/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_472cf80fffa4084c50c8211d5a1f4e12
Files
-
JaffaCakes118_472cf80fffa4084c50c8211d5a1f4e12.exe windows:4 windows x86 arch:x86
b904bb837d182ca1a45878404a2517b9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFileTimeToFileTime
WriteFile
GetProcAddress
GetVersion
FindFirstFileW
GetACP
CreateMutexW
GetCalendarInfoW
ReleaseMutex
SetFilePointer
GetThreadLocale
InterlockedExchange
FindNextFileW
RaiseException
GetCurrentDirectoryW
GetLocaleInfoA
GetThreadContext
SystemTimeToFileTime
GetCurrentProcessId
WideCharToMultiByte
VirtualFree
lstrcpyW
EnumResourceLanguagesW
LoadResource
lstrcmpiA
EnumResourceNamesA
FindClose
InterlockedDecrement
CreateFileW
CloseHandle
SetFileTime
GetModuleFileNameW
GetSystemDefaultLangID
DeleteCriticalSection
FindResourceW
ExitProcess
MultiByteToWideChar
DeleteFileW
LockResource
MoveFileW
ConvertDefaultLocale
WaitForSingleObject
GetModuleHandleW
GetLocaleInfoW
LoadLibraryW
GetFileAttributesW
FreeLibrary
RemoveDirectoryW
InitializeCriticalSection
SizeofResource
ReadFile
GetVersionExW
CreateDirectoryW
lstrcmpA
gdi32
GetViewportExtEx
GetBkColor
GetDeviceCaps
GetWindowExtEx
RectVisible
SetMapMode
CreateBitmap
SaveDC
SelectObject
ScaleWindowExtEx
SetWindowExtEx
GetTextColor
PtVisible
ExtTextOutW
GetMapMode
ScaleViewportExtEx
RestoreDC
SetTextColor
DeleteObject
GetClipBox
DeleteDC
TextOutW
GetStockObject
SetBkColor
SetViewportOrgEx
OffsetViewportOrgEx
Escape
ExtSelectClipRgn
GetObjectW
GetRgnBox
SetViewportExtEx
CreateRectRgnIndirect
shlwapi
PathFindFileNameW
PathIsUNCW
PathFindExtensionW
PathFileExistsW
PathStripToRootW
PathRemoveFileSpecW
PathAppendW
oledlg
OleUIBusyW
ole32
StgCreateDocfileOnILockBytes
CoCreateInstance
CLSIDFromProgID
CoFreeUnusedLibraries
OleUninitialize
CoUninitialize
CreateILockBytesOnHGlobal
StgOpenStorageOnILockBytes
CoTaskMemAlloc
OleInitialize
CoInitialize
CoRevokeClassObject
OleIsCurrentClipboard
CoRegisterMessageFilter
CoTaskMemFree
OleFlushClipboard
CoGetClassObject
CLSIDFromString
user32
CreateWindowExW
MapWindowPoints
GetNextDlgTabItem
GetClassLongW
UpdateWindow
EqualRect
IsWindow
MessageBeep
GetNextDlgGroupItem
GetForegroundWindow
CopyAcceleratorTableW
GetWindowPlacement
InvalidateRect
IsRectEmpty
GetMessagePos
AdjustWindowRectEx
InvalidateRgn
WinHelpW
RegisterClassW
CallWindowProcW
CharUpperW
CharNextW
IsIconic
SetPropW
RemovePropW
SetRect
IntersectRect
GetClientRect
RegisterWindowMessageW
GetMenu
GetPropW
SetForegroundWindow
DefWindowProcW
SetActiveWindow
IsChild
GetMessageTime
OffsetRect
GetClassInfoExW
SendDlgItemMessageA
GetTopWindow
LoadIconW
GetClassInfoW
DestroyMenu
advapi32
RegQueryValueW
RegEnumKeyExW
RegOpenKeyW
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegSetValueExW
RegEnumKeyW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
shell32
SHCreateDirectoryExW
SHGetSpecialFolderPathW
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
comdlg32
GetFileTitleW
Sections
.text Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ