r:\VBSXYrnVRNvGSSE\JczvNzXEKBhLIcWo\UAdUAtVodBzDeXJvG\dokeKQtPqKqiUwhD\V.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ecddf2c9ef0e6190908c1a17b0478148_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ecddf2c9ef0e6190908c1a17b0478148_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
ecddf2c9ef0e6190908c1a17b0478148_JaffaCakes118
-
Size
1.5MB
-
MD5
ecddf2c9ef0e6190908c1a17b0478148
-
SHA1
6b9f00768f17de8b5a3f5aeb5e1f9e1b4ac65286
-
SHA256
98b9893cb19080dd25b7660c95e8e5de197ccf836b1e2c731cf878e50ce08981
-
SHA512
90b62b9a8fd9a231019343519c0ac44bc594a53eac734147a325cf45bd4708c453db2dbb28ede8a27be7e019ecaef87c01c86f8b7001487b48f2825b4153e718
-
SSDEEP
24576:S6vwseVDLF7RzA/8tQcJsy1TYG593rbj/PGwjarN+bdMqrT7tJIkXi3:RvwbBR1X93rHnzarN+2qrntGR3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ecddf2c9ef0e6190908c1a17b0478148_JaffaCakes118
Files
-
ecddf2c9ef0e6190908c1a17b0478148_JaffaCakes118.exe windows:5 windows x86 arch:x86
3382d4c7715cf4b821b89dc87290b31b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
inet_ntoa
socket
WSACleanup
WSAGetLastError
inet_pton
listen
bind
ntohs
inet_ntop
accept
WSAStartup
setsockopt
ioctlsocket
getsockopt
__WSAFDIsSet
select
htons
connect
gethostbyname
recv
closesocket
send
inet_addr
kernel32
FreeResource
LoadResource
FindResourceW
DeleteFileA
UnmapViewOfFile
GetFileSizeEx
MapViewOfFile
CreateFileMappingW
CreateFileA
VirtualProtectEx
GetCurrentProcess
GetLastError
GetModuleFileNameW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetProcAddress
LoadLibraryW
GetModuleHandleW
GetTickCount
GetACP
ReadFile
GetFileSize
CreateFileW
MulDiv
SetFilePointer
GetFileType
SizeofResource
SystemTimeToFileTime
DosDateTimeToFileTime
CreateDirectoryW
SetFileTime
WriteFile
InterlockedIncrement
InterlockedDecrement
GetLocalTime
TerminateProcess
OpenProcess
SetEvent
LoadLibraryA
SetEndOfFile
SetFilePointerEx
MoveFileExW
OpenThread
CreateSemaphoreW
InitializeCriticalSection
ReleaseSemaphore
GetProcessTimes
GetSystemTimeAsFileTime
FormatMessageW
DecodePointer
EncodePointer
InterlockedExchange
ExitProcess
LockResource
CreateThread
EnterCriticalSection
DuplicateHandle
LeaveCriticalSection
LocalFree
lstrlenW
RtlUnwind
RaiseException
ExitThread
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
SetConsoleCtrlHandler
SetStdHandle
GetExitCodeProcess
GetTimeZoneInformation
WriteConsoleW
GetStdHandle
LCMapStringW
GetCPInfo
SetLastError
GetCurrentThread
Sleep
GetProcessHeap
HeapAlloc
HeapFree
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsGetValue
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
GetLocaleInfoW
GetExitCodeThread
SetThreadPriority
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
WaitForSingleObject
CloseHandle
CreateEventW
MultiByteToWideChar
WideCharToMultiByte
HeapSize
SetHandleCount
GetConsoleCP
GetConsoleMode
FatalAppExitA
GetOEMCP
IsValidCodePage
FreeLibrary
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CompareStringW
SetEnvironmentVariableA
FlushFileBuffers
InterlockedCompareExchange
user32
GetSysColor
SetCaretPos
ShowCaret
HideCaret
CreateCaret
CreateAcceleratorTableW
InvalidateRgn
SetWindowTextW
GetWindowTextLengthW
GetWindowTextW
SetRect
CharPrevW
DrawTextW
FillRect
CharNextW
SetCursor
GetCaretPos
InflateRect
OffsetRect
GetCursorPos
GetUpdateRect
BeginPaint
EndPaint
IsRectEmpty
GetFocus
DestroyWindow
ReleaseDC
PtInRect
ReleaseCapture
SetCapture
KillTimer
SetTimer
InvalidateRect
GetDC
UnionRect
GetKeyState
CreateWindowExW
GetClassInfoExW
RegisterClassExW
LoadCursorW
RegisterClassW
GetMenu
AdjustWindowRectEx
SetPropW
GetPropW
GetSystemMetrics
LoadImageW
GetWindow
EnableWindow
GetMessageW
SetFocus
TranslateMessage
DispatchMessageW
IsWindow
DefWindowProcW
wsprintfW
MessageBoxW
SetWindowRgn
ScreenToClient
IsZoomed
IsIconic
ClientToScreen
PostQuitMessage
IntersectRect
GetWindowLongW
SetWindowLongW
GetClientRect
SetWindowPos
MonitorFromWindow
GetMonitorInfoW
GetWindowRect
MapWindowPoints
MoveWindow
SetForegroundWindow
ShowWindow
SendMessageW
GetParent
PostMessageW
CallWindowProcW
gdi32
DeleteObject
RestoreDC
BitBlt
SaveDC
CreateCompatibleBitmap
CreateCompatibleDC
SelectClipRgn
ExtSelectClipRgn
CreateRectRgnIndirect
GetClipBox
CombineRgn
StretchBlt
CreateDIBSection
SetStretchBltMode
ExtTextOutW
SetBkColor
CreateSolidBrush
CreateRoundRectRgn
MoveToEx
CreatePenIndirect
RoundRect
SetTextColor
SetBkMode
TextOutW
GetTextExtentPoint32W
GetCharABCWidthsW
GdiFlush
GetObjectA
GetDeviceCaps
SetWindowOrgEx
DeleteDC
CreatePen
GetStockObject
GetObjectW
CreateFontIndirectW
GetTextMetricsW
LineTo
SelectObject
Rectangle
shell32
ShellExecuteW
ole32
CLSIDFromProgID
CLSIDFromString
OleLockRunning
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
VariantInit
VariantClear
CreateErrorInfo
SysFreeString
GetErrorInfo
VariantChangeType
SetErrorInfo
SysAllocString
comctl32
ord17
_TrackMouseEvent
gdiplus
GdipDeleteBrush
GdipFree
GdipAlloc
GdipCreateStringFormat
GdipDeleteStringFormat
GdipDeleteGraphics
GdipDeleteFont
GdiplusStartup
GdipCreateLineBrushI
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipCreateFromHDC
GdipSetTextRenderingHint
GdipDrawString
GdipCreateFontFromDC
GdipCreateFontFromLogfontA
GdipCloneBrush
GdiplusShutdown
imm32
ImmReleaseContext
ImmGetContext
ImmSetCompositionWindow
iphlpapi
GetAdaptersInfo
Sections
.text Size: 831KB - Virtual size: 831KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 158KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 441KB - Virtual size: 441KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ