X:\bnxzQTjjiaQnt\ykVKniwNajIsdi\khrbCnxkfftX\jKuRpbXn\JFeBQXfarZfAaO.pdb
Static task
static1
Behavioral task
behavioral1
Sample
edb6cd720265c34f560d13ddaf0f45e0_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
edb6cd720265c34f560d13ddaf0f45e0_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
edb6cd720265c34f560d13ddaf0f45e0_JaffaCakes118
-
Size
112KB
-
MD5
edb6cd720265c34f560d13ddaf0f45e0
-
SHA1
c1819dc54654af43f8a6c89cf7d13f375a481e36
-
SHA256
8007343b1b59b2f73236843b1f93f9331192197aafb98259f1c2f66f122379cb
-
SHA512
3d49830d6e52e41f345f3d4d366ed9aca0e0e87a97f71081254b40814320f05bf8ab58813f4af8f06a8718a0461919911b999b75f87dfed9cd3ede4f33b637f4
-
SSDEEP
3072:44ihweviW9gfMzLjs/oS0hSZJrhJsosZ:nihweaPMz0NHrhJs/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource edb6cd720265c34f560d13ddaf0f45e0_JaffaCakes118
Files
-
edb6cd720265c34f560d13ddaf0f45e0_JaffaCakes118.dll windows:5 windows x86 arch:x86
b3dc2e48535ff5aff07813370f4a6ee9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
gdi32
StretchDIBits
RealizePalette
StretchBlt
Rectangle
CreateCompatibleDC
SetWindowOrgEx
GetTextExtentPointW
EnumFontFamiliesW
GetClipBox
CreateDIBitmap
CreateDCW
CreateRectRgnIndirect
Ellipse
WidenPath
SetLayout
CreateFontW
ExtFloodFill
ExtTextOutA
MoveToEx
shlwapi
StrCatBuffW
user32
InsertMenuItemW
GetScrollInfo
CreateWindowExW
ShowCaret
CreateCursor
SetWindowPos
CopyImage
IntersectRect
MapVirtualKeyExW
ShowCursor
DialogBoxParamW
CreateDialogParamA
FindWindowA
DrawFocusRect
GetDlgItemTextA
WaitMessage
GetWindowTextA
LookupIconIdFromDirectory
IsWindowVisible
GetMenuCheckMarkDimensions
ClientToScreen
GetClassLongW
GetShellWindow
UpdateWindow
CheckMenuItem
SetScrollInfo
PostMessageW
KillTimer
IsCharAlphaNumericW
CharUpperW
ShowWindow
CharUpperA
ModifyMenuW
SetScrollPos
TrackPopupMenu
DrawEdge
IsCharAlphaNumericA
PostThreadMessageA
LoadImageW
DragObject
CharNextA
CreateCaret
GetWindowPlacement
DefWindowProcA
LoadImageA
kernel32
GetModuleHandleA
OpenFileMappingW
EnumResourceTypesA
CreateMailslotW
WinExec
GetStartupInfoA
GetFileTime
SearchPathW
LeaveCriticalSection
GetVersionExA
GetSystemWindowsDirectoryW
LCMapStringW
GetFileAttributesA
SetThreadExecutionState
FindFirstFileA
CreateSemaphoreW
LoadLibraryW
HeapCreate
LoadLibraryExA
GetFileAttributesExW
HeapAlloc
CreateFileW
comctl32
InitCommonControlsEx
ImageList_Read
DestroyPropertySheetPage
msvcrt
_controlfp
__set_app_type
__p__fmode
puts
strcpy
__p__commode
rand
_amsg_exit
_initterm
_acmdln
exit
strtol
localtime
_ismbblead
towlower
wcschr
_XcptFilter
isprint
_exit
time
strncpy
toupper
_cexit
atol
realloc
__setusermatherr
__getmainargs
Exports
Exports
InstallU
?GlobalMemoryExW@@YGIIGFJ~U
PluginCommand
PluginMain
PluginName
?HideFunctionEx@@YGPAKJ~U
PluginType
?LoadHeaderOriginal@@YGDPAK~U
PluginVersion
WSPStartup
?EnumOptionOld@@YGPAXKHPA_NF~U
?ExecuteLoaderTrayXBwyGD@@YGKGHE@Z
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ticx Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kip Size: 1024B - Virtual size: 524B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ticy Size: 1024B - Virtual size: 534B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zdata Size: 512B - Virtual size: 224B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.heap Size: - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ