n:\eswszsyxu\oeue\keeqo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f677bbc6d04fa46219dfe0631bb43ea4_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f677bbc6d04fa46219dfe0631bb43ea4_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f677bbc6d04fa46219dfe0631bb43ea4_JaffaCakes118
-
Size
498KB
-
MD5
f677bbc6d04fa46219dfe0631bb43ea4
-
SHA1
ae7533368fae1cf85f1f08f2b7e4d556b9d1c4d3
-
SHA256
2e7a9323b554b16c20c49fb9918021661ff38ad0ae2a2eb939b0d95663d8004c
-
SHA512
9ba1194e5fcc8edd1dab9e05846a5829f408355ffa5291f82cff73d3f18ff08a71271b9bf73a4039a1aa164ea213fe4d0a6437d2de1cd2cb984e8e878d9bb651
-
SSDEEP
6144:Gufv6LDLAW7wVydXIE6tLIK0O1hyNYP9w1GbHVkKxP/yKT6McgjWcJL:9iLjMqXIE6tL9t10a9aO7KzxgK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f677bbc6d04fa46219dfe0631bb43ea4_JaffaCakes118
Files
-
f677bbc6d04fa46219dfe0631bb43ea4_JaffaCakes118.exe windows:4 windows x86 arch:x86
6d352beea8738c1baa3628e663894b42
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
ReplaceTextW
wininet
GopherCreateLocatorW
InternetGetConnectedStateExA
UnlockUrlCacheEntryStream
DeleteUrlCacheEntry
FtpOpenFileA
RetrieveUrlCacheEntryStreamA
FtpPutFileEx
user32
VkKeyScanExA
RegisterClassExA
GetWindowContextHelpId
CharNextW
PaintDesktop
RegisterClassA
EnableMenuItem
ChangeDisplaySettingsExW
AdjustWindowRectEx
GetPriorityClipboardFormat
InvertRect
LoadCursorFromFileA
MessageBoxIndirectA
LoadCursorFromFileW
DrawFrameControl
ChangeDisplaySettingsA
DdeUninitialize
GetAncestor
CharToOemW
comctl32
InitCommonControlsEx
kernel32
CreateMutexA
GetTimeFormatA
WriteConsoleA
OpenEventA
GetLogicalDrives
Sleep
SetEnvironmentVariableA
GetTimeZoneInformation
VirtualFree
WriteConsoleW
CompareStringA
InterlockedExchange
GetVersionExA
EnumSystemCodePagesW
VirtualUnlock
RemoveDirectoryW
GetEnvironmentStrings
WideCharToMultiByte
GetStringTypeA
CreateFileA
MultiByteToWideChar
HeapSize
GetLocaleInfoW
GetTickCount
EnumSystemLocalesA
LocalCompact
GlobalAlloc
GetConsoleMode
OpenWaitableTimerW
OpenMutexW
QueryPerformanceCounter
SetLastError
GetStartupInfoA
CompareStringW
TlsAlloc
GetEnvironmentStringsW
HeapReAlloc
ExitProcess
OpenMutexA
GetCurrentThreadId
HeapAlloc
FreeEnvironmentStringsW
TlsFree
SetStdHandle
GetPrivateProfileSectionNamesA
LoadLibraryA
HeapDestroy
GetLastError
GetCommandLineA
GetCurrentProcessId
GetDateFormatA
GetFileAttributesExW
GetLocaleInfoA
CreateRemoteThread
GetSystemTimeAsFileTime
GetStringTypeW
FreeEnvironmentStringsA
HeapFree
InitializeCriticalSection
GetCurrentProcess
GetStdHandle
GetPrivateProfileIntA
LeaveCriticalSection
GetCPInfo
GetOEMCP
VirtualAlloc
ReadFile
IsValidLocale
SetConsoleCtrlHandler
ReadConsoleOutputCharacterA
FlushFileBuffers
IsValidCodePage
LoadLibraryW
DeleteCriticalSection
SetUnhandledExceptionFilter
GetProcAddress
GetUserDefaultLCID
SetFilePointer
WriteFile
GetThreadTimes
GetACP
GetConsoleOutputCP
GetCurrentThread
InterlockedDecrement
GetConsoleCP
InterlockedIncrement
GetFileType
HeapCreate
DeleteFiber
TerminateProcess
FreeLibrary
LCMapStringA
CloseHandle
GetModuleFileNameA
LCMapStringW
VirtualQuery
GetProcessHeap
IsDebuggerPresent
UnhandledExceptionFilter
EnterCriticalSection
GetModuleHandleA
TlsGetValue
SetHandleCount
TlsSetValue
RtlUnwind
Sections
.text Size: 317KB - Virtual size: 317KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ