d:\eakgcbaqg.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ed8164d703a12d9c8540dd9afd41abad_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ed8164d703a12d9c8540dd9afd41abad_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ed8164d703a12d9c8540dd9afd41abad_JaffaCakes118
-
Size
419KB
-
MD5
ed8164d703a12d9c8540dd9afd41abad
-
SHA1
07de5abdcd359e2568ff93a995f2abbbe00fdf9d
-
SHA256
3948b12e176915095454e18c3a67ada20f6464a2a20b960ab4410df38597ac8a
-
SHA512
50623c8849bea2c95e41e216e38fcd4385377a2b4f37dbb99c2f77d59dddbc8032cbe95de3ab94a54baffa0fbc78ed49a8b872922c1bece030163b88bdf6a274
-
SSDEEP
6144:sxDIxqiCyfPywLuP6FJcqdthHcjlNBrxqqg71kuJlpxSDjrypRGRApn7YsEPF:sG0i/hu2dth87JBgpkawypRGRennE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ed8164d703a12d9c8540dd9afd41abad_JaffaCakes118
Files
-
ed8164d703a12d9c8540dd9afd41abad_JaffaCakes118.exe windows:4 windows x86 arch:x86
b709c71594865cc74843326c89d0e28c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
CreateStatusWindowA
ImageList_AddIcon
DrawStatusTextW
ImageList_Draw
ImageList_Remove
ImageList_SetFlags
ImageList_GetDragImage
GetEffectiveClientRect
ImageList_DragShowNolock
ImageList_DragLeave
_TrackMouseEvent
CreateStatusWindow
CreateToolbarEx
CreateToolbar
InitCommonControlsEx
DrawStatusTextA
ImageList_SetOverlayImage
CreatePropertySheetPageA
CreatePropertySheetPage
ImageList_Destroy
DestroyPropertySheetPage
user32
CreateWindowExW
DdeCreateStringHandleA
GetCursor
MessageBoxA
LoadAcceleratorsA
SetMenuInfo
UnregisterClassW
ShowScrollBar
GetWindowTextLengthW
GetMessagePos
DestroyWindow
SetCaretPos
SetWindowsHookA
RemoveMenu
SetWinEventHook
RegisterClassA
BlockInput
ShowWindow
RegisterClassExA
ChangeDisplaySettingsExW
CountClipboardFormats
GetWindowLongW
DefFrameProcA
IsMenu
IntersectRect
GetSystemMetrics
TranslateMessage
DeferWindowPos
GetWindowInfo
DefWindowProcA
gdi32
RealizePalette
PolyTextOutA
Pie
LineTo
SetSystemPaletteUse
AnimatePalette
GetTextCharacterExtra
comdlg32
GetOpenFileNameA
PrintDlgW
kernel32
GetFileType
OpenMutexA
RtlMoveMemory
LeaveCriticalSection
GetModuleFileNameA
GetStringTypeA
IsValidLocale
SetFilePointer
FreeEnvironmentStringsW
GetACP
WideCharToMultiByte
DeleteCriticalSection
GetEnvironmentStringsW
GetCurrentProcessId
GetTimeFormatA
GetSystemInfo
GetModuleHandleA
GetStringTypeW
VirtualFree
InterlockedExchange
GetStartupInfoA
ConnectNamedPipe
IsBadWritePtr
GetCurrentThreadId
SetEnvironmentVariableA
SetLastError
RtlUnwind
ReadFile
SetConsoleCtrlHandler
HeapAlloc
SetHandleCount
MultiByteToWideChar
LCMapStringW
CompareStringA
VirtualAlloc
GetUserDefaultLCID
HeapReAlloc
GetTimeZoneInformation
GetCurrentThread
IsValidCodePage
HeapFree
GetLocaleInfoA
TlsFree
CloseHandle
EnterCriticalSection
CompareStringW
GetDateFormatA
QueryPerformanceCounter
UnhandledExceptionFilter
GetStdHandle
VirtualProtect
GetVersionExA
SetStdHandle
GetTickCount
GetOEMCP
WriteFile
HeapCreate
TlsGetValue
InitializeCriticalSection
VirtualQuery
EnumSystemLocalesA
GetCurrentProcess
GetLocaleInfoW
GetSystemTimeAsFileTime
LCMapStringA
GetEnvironmentStrings
GetProcAddress
HeapDestroy
ExitProcess
GetLastError
HeapSize
FlushFileBuffers
TlsSetValue
LoadLibraryA
CreateMutexA
GetConsoleCP
FreeEnvironmentStringsA
GetCPInfo
GetCommandLineA
TlsAlloc
TerminateProcess
Sections
.text Size: 163KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 135KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 99KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ