L:\tcJLkcCtxNO\eXkZVfLogjF\pxMPFhlxskOkef.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118
-
Size
135KB
-
MD5
e95fde3755bfdc750ed7951ec8e39507
-
SHA1
9860efa2f66d70207bb994bec6b444e13eac8f7d
-
SHA256
f8c73b12c29665c5c88bd7ce4ab9b609c8b82961f22f3a059a6b514149ea2f6d
-
SHA512
b7bc3697a2f9b6cc14a5d069b4fef490956a88879a9ea0b4c390b121e5c53fc4bcb807e513dce04b6ce688c674becdefcf0846a80c6784c7e198c739aa9da85d
-
SSDEEP
3072:T6YDfgKvdZYYMT7hOLiQ1JkeqXBhS9M9I7eHlZZly8C9:TN4KvcYqcWsJkeSSOak6n9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118
Files
-
e95fde3755bfdc750ed7951ec8e39507_JaffaCakes118.exe windows:5 windows x86 arch:x86
4b7a3b1ed217bcda3c13222ecc81c7be
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
DestroyWindow
DrawEdge
IsWindow
RegisterClassExW
SetDlgItemInt
GetScrollInfo
IsMenu
SetDlgItemTextW
CharLowerA
CheckMenuRadioItem
RegisterWindowMessageA
IsCharAlphaA
GetMenuState
LoadStringA
CharNextW
DrawMenuBar
DefDlgProcW
IsIconic
GetWindow
LoadBitmapA
DestroyMenu
CreateDialogParamW
DefWindowProcA
RemovePropW
CopyImage
GetDlgCtrlID
GetUserObjectInformationA
VkKeyScanA
kernel32
GetModuleHandleA
GetProcessHeap
ResetEvent
GetCommModemStatus
IsBadWritePtr
WinExec
MapViewOfFile
lstrcmpiA
GetCommConfig
CompareStringA
GetModuleFileNameA
AreFileApisANSI
GlobalFree
HeapAlloc
LocalSize
GetTickCount
GetSystemDefaultUILanguage
FlushViewOfFile
GlobalAddAtomW
msvcrt
exit
gdi32
CreateRectRgn
SetTextAlign
SetDIBits
CreateDiscardableBitmap
SetTextColor
CreatePen
OffsetRgn
GetTextCharsetInfo
MoveToEx
DeleteDC
GetLayout
OffsetViewportOrgEx
SetPixel
shlwapi
ord29
StrTrimA
StrRChrA
Exports
Exports
?_cklsi__au_c___NQ_@@PTPAIPAH@Z
Sections
.text Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 261B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.$debug Size: 512B - Virtual size: 98B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data1 Size: 512B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data2 Size: 512B - Virtual size: 372B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data3 Size: 1024B - Virtual size: 560B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data4 Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 282KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ