H:\xsvjjdtyzM\kunnuClc\STlMzpkhp\inftSkhq.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f1f14045a01a3755a565714275036477_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f1f14045a01a3755a565714275036477_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f1f14045a01a3755a565714275036477_JaffaCakes118
-
Size
216KB
-
MD5
f1f14045a01a3755a565714275036477
-
SHA1
b91a75e34044674d845aca67ac7ded6c25d35434
-
SHA256
d00625d50223010ae769976d51962d711a784a4bfa3d79b80971b076f0e6a420
-
SHA512
86e16ecce00a63508ef6b56989054cc9f2fddd8071e8962740dcecbba398cbafdd6862673c7d8273367d1a4667a6868361c9cf87e4db90e10969b50246059edc
-
SSDEEP
3072:Fu533lKlyQCR8ShGIuarUs82ZBBQ2QXkQYExh7vbnStiGByN6mfNcmPk7tjSuHGl:F53+b0dPs8J2QXkPExtzSti/cmPkpH0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f1f14045a01a3755a565714275036477_JaffaCakes118
Files
-
f1f14045a01a3755a565714275036477_JaffaCakes118.exe windows:5 windows x86 arch:x86
bf2926f3d58ce76fdcc702cc1ed6765e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
GetMenuItemInfoW
OemToCharBuffA
SetMenuDefaultItem
SendNotifyMessageW
CharNextW
GetMessageExtraInfo
MapVirtualKeyA
TabbedTextOutW
GetDlgCtrlID
GetSubMenu
IsWindowVisible
InsertMenuItemW
GrayStringW
DialogBoxIndirectParamA
GetForegroundWindow
CharUpperBuffA
DispatchMessageW
SetScrollRange
ShowCursor
SetRect
DrawAnimatedRects
EnumChildWindows
InvertRect
InternalGetWindowText
FindWindowA
GetScrollInfo
CharToOemW
GetKeyboardLayout
LoadMenuW
DrawEdge
WaitForInputIdle
CheckDlgButton
DrawFrameControl
CopyImage
msvcrt
_controlfp
remove
__set_app_type
vsprintf
mbstowcs
__p__fmode
calloc
__p__commode
putc
_amsg_exit
sprintf
_initterm
free
_acmdln
exit
_ismbblead
strerror
_XcptFilter
_exit
iswctype
_cexit
__setusermatherr
clock
__getmainargs
kernel32
GlobalAddAtomA
lstrcpynW
IsValidLocale
FindNextChangeNotification
IsBadReadPtr
IsBadCodePtr
SetCurrentDirectoryW
HeapReAlloc
CreateMutexA
lstrcpyW
EnumResourceLanguagesA
UnlockFile
GetFileAttributesA
GlobalGetAtomNameW
GetSystemWindowsDirectoryA
GetCommandLineW
gdi32
Polyline
GetTextAlign
CreateDiscardableBitmap
ExcludeClipRect
CreateFontIndirectA
GetTextFaceW
RealizePalette
SetDIBitsToDevice
GetRgnBox
GetObjectA
GetTextExtentPoint32W
CreateCompatibleBitmap
RestoreDC
SetStretchBltMode
GetSystemPaletteUse
comctl32
ImageList_Create
DestroyPropertySheetPage
ImageList_Destroy
PropertySheetW
Exports
Exports
?DeleteSecurityDescriptorHdfjhjkfK@@YGKEPA_WG@Z
Sections
.text Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idat Size: 512B - Virtual size: 392B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.diag_x Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.div Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.diag_y Size: 512B - Virtual size: 70B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.imul Size: 512B - Virtual size: 258B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.plus Size: 1024B - Virtual size: 569B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.minus Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ