I:\hDaknTnXSli\nUtcEafI\OZNdhaMA\HllsqpxUpk\VlqaGvczk.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f1a5ee6cade49ba24ebb08b4b13794dc_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f1a5ee6cade49ba24ebb08b4b13794dc_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f1a5ee6cade49ba24ebb08b4b13794dc_JaffaCakes118
-
Size
215KB
-
MD5
f1a5ee6cade49ba24ebb08b4b13794dc
-
SHA1
489bb549d08771e8253d3f934ff8a83ba9ef4c6f
-
SHA256
3f0813d0117877b9b9b5f27593e9de492093ad9e6cb84f293c1acd62758f822f
-
SHA512
b11be250984b1306a7e2dd80e7f2086052da23f80517d97b892ae8104b6926d326ffae0cdee573453ca7983fb23e7857158bad5dc3518b62eefff6b539aea60a
-
SSDEEP
3072:DmXAzyEUhD+JRTdG2q3RDtutgyr2LQ0DHSp4vBMydY57pq2FvAy89U4APk7b1:DDzm+JjqBButd6LQ0I4eLO2H2UtPkP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f1a5ee6cade49ba24ebb08b4b13794dc_JaffaCakes118
Files
-
f1a5ee6cade49ba24ebb08b4b13794dc_JaffaCakes118.exe windows:5 windows x86 arch:x86
9c8e3aa8fc00786d66267d3d5cc723ed
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_AddMasked
CreatePropertySheetPageA
CreatePropertySheetPageW
PropertySheetA
ImageList_GetImageCount
user32
LoadIconA
SetPropW
IsCharAlphaNumericW
WaitForInputIdle
OemToCharBuffA
SetMenuDefaultItem
ChildWindowFromPointEx
CopyAcceleratorTableW
DestroyCursor
UnloadKeyboardLayout
CharNextExA
DefFrameProcW
MonitorFromRect
InSendMessage
IsIconic
GetWindowPlacement
DispatchMessageA
GetKeyNameTextW
CallWindowProcA
BeginDeferWindowPos
GetMessageW
SetLastErrorEx
GrayStringW
ReplyMessage
GetMenuCheckMarkDimensions
GetDlgItemTextW
SetDlgItemInt
SystemParametersInfoA
SetParent
GetKeyboardLayoutList
ShowCaret
CharLowerW
VkKeyScanW
kernel32
LocalFree
FindCloseChangeNotification
UnhandledExceptionFilter
GetBinaryTypeW
GetComputerNameA
FileTimeToSystemTime
DeleteAtom
GetCompressedFileSizeW
lstrcpyW
QueryDosDeviceW
GetWindowsDirectoryA
RemoveDirectoryA
DisconnectNamedPipe
GetComputerNameExW
GetACP
SetNamedPipeHandleState
msvcrt
towupper
toupper
_controlfp
__set_app_type
__p__fmode
__p__commode
bsearch
_amsg_exit
_initterm
_acmdln
fclose
strtok
strcspn
wcsstr
wcstombs
mktime
exit
_ismbblead
_XcptFilter
_exit
_cexit
fprintf
__setusermatherr
__getmainargs
gdi32
GetTextMetricsA
EndPage
GetTextExtentPointW
SetWindowExtEx
GetDeviceCaps
Polyline
RoundRect
OffsetViewportOrgEx
ExcludeClipRect
UnrealizeObject
GetROP2
TextOutW
CreateDiscardableBitmap
AddFontResourceW
Exports
Exports
?DeleteSecurityDescriptorHdfjhjkfK@@YGKEPA_WG@Z
Sections
.text Size: 175KB - Virtual size: 174KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idat Size: 512B - Virtual size: 388B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.diag_x Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.div Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.diag_y Size: 512B - Virtual size: 82B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.imul Size: 512B - Virtual size: 162B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.plus Size: 1024B - Virtual size: 900B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.minus Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ