m:\fdedt\ywvztf\goxu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f247683d2d802a7e0e8af966e0c5f3dd_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f247683d2d802a7e0e8af966e0c5f3dd_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f247683d2d802a7e0e8af966e0c5f3dd_JaffaCakes118
-
Size
286KB
-
MD5
f247683d2d802a7e0e8af966e0c5f3dd
-
SHA1
9f59ee82bc68e720e5aa05db00fd70105e627481
-
SHA256
c7a64f69d78bc47adb3e1ebdd59adef7c3545131e9d2b0791d3d121925ebcc0a
-
SHA512
f2a60b3c2064c13d3864672cc8c9d11beaba8a5e2289035397fa4f5bc8bb7b39226a78dff7ba115defca2e9446dbe64a515f28072602afa27d17fbcbd6ee7c14
-
SSDEEP
6144:4McUCQRMNTo7ofH1dvYjpr/L3PXIvBXCaPeVoCWaHMH:ZcUn+e7q7vMrTP6XCaDsa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f247683d2d802a7e0e8af966e0c5f3dd_JaffaCakes118
Files
-
f247683d2d802a7e0e8af966e0c5f3dd_JaffaCakes118.exe windows:4 windows x86 arch:x86
96cdc1afc40f7dfe391fe0d61015ed71
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
DrawInsert
ImageList_SetIconSize
InitCommonControlsEx
ImageList_DrawIndirect
CreateStatusWindowA
kernel32
QueryPerformanceCounter
OpenFileMappingW
GetEnvironmentStrings
SetLastError
lstrlen
SetEvent
EnterCriticalSection
HeapCreate
GetTickCount
WriteConsoleOutputAttribute
TryEnterCriticalSection
MoveFileW
GetCommandLineW
ReadFile
GetCurrentProcessId
CreateWaitableTimerA
SetVolumeLabelW
UnhandledExceptionFilter
LCMapStringW
LocalUnlock
FreeEnvironmentStringsA
GetACP
HeapAlloc
GetModuleFileNameA
FileTimeToDosDateTime
FreeEnvironmentStringsW
lstrcpynA
DeleteFiber
SetConsoleCP
TlsAlloc
GetStartupInfoW
TlsGetValue
HeapFree
WideCharToMultiByte
LCMapStringA
GetTempFileNameW
IsBadWritePtr
GetLogicalDriveStringsW
CompareStringW
WritePrivateProfileSectionA
ExitProcess
DeleteCriticalSection
InterlockedIncrement
VirtualQuery
LeaveCriticalSection
WriteFile
GetModuleHandleA
GetStdHandle
LoadLibraryA
CreateMutexA
GetDiskFreeSpaceW
CreateFileMappingA
GetStringTypeW
SetConsoleCtrlHandler
VirtualFree
ReadConsoleOutputW
GetSystemTimeAsFileTime
GetEnvironmentStringsW
SetFileAttributesW
InitializeCriticalSection
GetProcAddress
SetConsoleTitleA
GetCurrentThread
GetCPInfo
GetConsoleCursorInfo
HeapReAlloc
GetCommandLineA
GetConsoleOutputCP
CreateRemoteThread
GetSystemTime
TlsFree
GetConsoleCP
LocalShrink
SetHandleCount
CloseHandle
GetModuleFileNameW
MultiByteToWideChar
InterlockedExchange
SetThreadAffinityMask
GetCurrentThreadId
MoveFileExW
GetLocalTime
RtlUnwind
GetVersion
SetStdHandle
TerminateProcess
UnlockFileEx
HeapDestroy
CreateSemaphoreW
SetConsoleWindowInfo
GetLastError
RemoveDirectoryW
GetPriorityClass
ReadConsoleInputA
SetFilePointer
OpenMutexA
MapViewOfFileEx
GetStartupInfoA
GetTimeZoneInformation
lstrcpyA
CompareStringA
GetPrivateProfileSectionNamesA
SetConsoleCursorPosition
GetFileTime
VirtualAlloc
GetVolumeInformationW
InterlockedDecrement
GetStringTypeA
TlsSetValue
SetEnvironmentVariableA
GlobalFindAtomW
SetCurrentDirectoryW
GetCurrentProcess
GetLocaleInfoA
GetNamedPipeHandleStateW
GetFileType
CompareFileTime
FlushFileBuffers
WaitNamedPipeA
user32
ValidateRect
PostThreadMessageA
BeginPaint
DefMDIChildProcA
DispatchMessageW
GetAncestor
SetCursorPos
MessageBoxA
GetMonitorInfoW
DefWindowProcW
RegisterClassExA
SetMenuItemBitmaps
GetMenuState
SetUserObjectInformationW
ShowWindow
RegisterDeviceNotificationA
DestroyMenu
InsertMenuW
FlashWindowEx
GetSystemMenu
TrackMouseEvent
SwapMouseButton
RegisterClassA
DrawStateW
DialogBoxParamW
DestroyWindow
CreateWindowExW
Sections
.text Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 89KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ