d:\gekn\jsjkssf.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f6b0dce442e3c535f48f27b0e66607fb_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f6b0dce442e3c535f48f27b0e66607fb_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f6b0dce442e3c535f48f27b0e66607fb_JaffaCakes118
-
Size
620KB
-
MD5
f6b0dce442e3c535f48f27b0e66607fb
-
SHA1
c031f89d8fc36c33c7da68d125fe3d003e13365c
-
SHA256
72499e9c1b5c80a43c505f4e53c2d0cc28a85c300468ed4ff48b189cd63bc537
-
SHA512
0bd97e8cac0214e6306c8a2baeb771aeb6007a098df6fab8d86f0d8b0131be92d9361596bebf0838c5458d4582e0a2839cbfc8a85ac755b0adb71efc0de71193
-
SSDEEP
12288:zHQ7VM+x5R0CTsbid83z55Ttum03ffMC/kS7oN2C3jtw:zw7VM+XRXTsbW3fECdoMC3jtw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f6b0dce442e3c535f48f27b0e66607fb_JaffaCakes118
Files
-
f6b0dce442e3c535f48f27b0e66607fb_JaffaCakes118.exe windows:4 windows x86 arch:x86
6e40aa45dee68f51b836d51991eeda8e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
GetFileTitleW
shell32
SHAppBarMessage
ExtractAssociatedIconA
comctl32
ImageList_Add
ImageList_AddIcon
ImageList_SetOverlayImage
ImageList_SetIconSize
ImageList_LoadImageW
ImageList_Destroy
DrawStatusText
InitCommonControlsEx
DrawStatusTextW
ImageList_Write
CreateMappedBitmap
advapi32
RegFlushKey
RegSaveKeyW
AbortSystemShutdownA
RegOpenKeyW
GetUserNameA
RegConnectRegistryW
CryptGetProvParam
RegCreateKeyExW
ReportEventW
InitiateSystemShutdownA
CryptAcquireContextA
CryptHashSessionKey
RegConnectRegistryA
CryptImportKey
CryptSetProviderA
CryptGetUserKey
LookupSecurityDescriptorPartsW
CryptSetProviderExA
CryptSetProviderW
CryptReleaseContext
CryptDestroyHash
user32
GetInputDesktop
IntersectRect
ShowWindow
DdeInitializeW
CreateWindowExW
SetClassWord
GetCaretBlinkTime
GetMessageTime
DrawMenuBar
SetWindowContextHelpId
InsertMenuA
IsDlgButtonChecked
SetClipboardData
RegisterClassExA
GetCapture
DefWindowProcW
DdeAddData
GetMessagePos
MessageBeep
RegisterClassA
GetClipboardData
SetCaretBlinkTime
GetCursor
MessageBoxA
GetWindowPlacement
wsprintfW
IsIconic
DestroyWindow
GetPropW
GetWindowTextA
SetRect
kernel32
LCMapStringA
LCMapStringW
UnmapViewOfFile
GetTickCount
GetStartupInfoA
RtlUnwind
SetComputerNameA
VirtualFree
LeaveCriticalSection
HeapSize
SetCurrentDirectoryA
GetConsoleCursorInfo
ReadConsoleOutputCharacterA
GetSystemDefaultLCID
GetCPInfo
SetWaitableTimer
VirtualQuery
TerminateProcess
SetFilePointer
FreeLibrary
FreeEnvironmentStringsA
CreateProcessW
GetEnvironmentStrings
lstrcmpA
WaitNamedPipeA
QueryPerformanceCounter
GlobalUnlock
GetStringTypeA
VirtualAlloc
GetStringTypeW
CreateSemaphoreA
FindFirstFileA
InterlockedExchange
GetFileType
SetStdHandle
IsBadWritePtr
SetThreadLocale
SetHandleCount
HeapAlloc
GetLocaleInfoW
CloseHandle
GetStringTypeExA
PulseEvent
MultiByteToWideChar
CompareStringA
SetCurrentDirectoryW
DeleteCriticalSection
GetCurrentDirectoryA
FoldStringW
LocalSize
GetCurrentProcess
GetDiskFreeSpaceA
GetCommandLineA
EnumTimeFormatsA
CreateDirectoryExW
GetACP
WaitForMultipleObjectsEx
GetVersionExA
GlobalLock
SetConsoleCP
SetConsoleTitleW
FindNextFileW
FindResourceExA
CreateWaitableTimerW
EnterCriticalSection
GetDiskFreeSpaceExA
SetConsoleCtrlHandler
RaiseException
EnumCalendarInfoW
CreateMutexA
GetLastError
GetTimeZoneInformation
GlobalSize
HeapFree
VirtualProtect
IsValidCodePage
GetTimeFormatA
CompareFileTime
HeapCreate
IsValidLocale
GetEnvironmentStringsW
InitializeCriticalSection
ResetEvent
SetLastError
EnumSystemLocalesA
SetSystemTime
FreeEnvironmentStringsW
GetCurrentProcessId
WideCharToMultiByte
GlobalReAlloc
GetOEMCP
OpenMutexA
EnumResourceTypesW
ExitProcess
GetCurrentThread
GetProcAddress
OpenSemaphoreW
GetSystemInfo
HeapReAlloc
SetThreadIdealProcessor
LoadLibraryA
GetLocaleInfoA
CompareStringW
GetModuleHandleA
GetSystemTimeAsFileTime
ReadFile
UnhandledExceptionFilter
CreateFileW
GetNamedPipeInfo
WritePrivateProfileStringA
TlsFree
TlsAlloc
GetTempFileNameA
FlushFileBuffers
SetEnvironmentVariableA
GetCompressedFileSizeA
LocalAlloc
TlsGetValue
GetDateFormatA
GetModuleFileNameA
GetStdHandle
GetCurrentThreadId
TlsSetValue
WriteFile
HeapDestroy
GetUserDefaultLCID
WaitForSingleObject
Sections
.text Size: 196KB - Virtual size: 192KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ