n:\htydsoeu\orf\ntfi\goweob\eeklawuexm\kjesudtx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f8fc3bde2c4d272e82de2096bb1aa274_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f8fc3bde2c4d272e82de2096bb1aa274_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f8fc3bde2c4d272e82de2096bb1aa274_JaffaCakes118
-
Size
588KB
-
MD5
f8fc3bde2c4d272e82de2096bb1aa274
-
SHA1
4d129eeaf6556d3aa4568994a7e08e7758067593
-
SHA256
132475ca0eebbcc75003ef86d8bcf189c1b037b2f387d4b3119d8278d4975212
-
SHA512
475348b3c8c1e14254d2212e17ad3c4d4d12f3a63072deb2be4ef5132ee59a5af3657e2075147956334bfc3f40f790c1c12c3d0c3fb0d22770d6454e94681625
-
SSDEEP
12288:IAndwIZ0acXPn2vuxmr8DOPzHbmR6hrtd8JthlZ4fTe9KSBXlOR:IAnCInUOLbmwrYnaTmZl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f8fc3bde2c4d272e82de2096bb1aa274_JaffaCakes118
Files
-
f8fc3bde2c4d272e82de2096bb1aa274_JaffaCakes118.exe windows:4 windows x86 arch:x86
6425e56c26352a407fb7fa0184ada05a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
EndPath
CreateColorSpaceA
GetTextCharacterExtra
SetROP2
StrokeAndFillPath
RectVisible
GetBitmapBits
CreateBrushIndirect
SetPixelFormat
SetViewportExtEx
SetAbortProc
CreateFontIndirectW
PaintRgn
SetWindowExtEx
GdiPlayJournal
ExcludeClipRect
EnumObjects
GetWinMetaFileBits
DescribePixelFormat
CreateCompatibleDC
GetOutlineTextMetricsW
PolyTextOutW
Ellipse
comctl32
ImageList_Copy
ImageList_Draw
ImageList_SetIconSize
ImageList_Write
ImageList_DrawEx
MakeDragList
ImageList_SetFlags
ImageList_Create
ImageList_LoadImageA
ImageList_DragLeave
CreateStatusWindowA
DrawStatusTextA
DestroyPropertySheetPage
ImageList_SetFilter
_TrackMouseEvent
ImageList_GetImageInfo
ImageList_GetBkColor
ImageList_EndDrag
ImageList_GetImageRect
CreateUpDownControl
CreatePropertySheetPage
CreateToolbarEx
InitCommonControlsEx
kernel32
lstrcpyW
HeapCreate
GetLocaleInfoA
GetStringTypeW
WaitNamedPipeW
GetCurrentThreadId
WriteConsoleW
LocalShrink
LoadLibraryA
CloseHandle
GetLocalTime
SetFilePointer
GlobalFix
CompareStringW
HeapReAlloc
RaiseException
ExpandEnvironmentStringsW
RtlUnwind
VirtualAlloc
lstrlenA
LCMapStringW
GetPrivateProfileSectionA
lstrcpyn
UnhandledExceptionFilter
GetPrivateProfileIntW
GetDateFormatA
HeapValidate
GetTimeFormatW
GetLogicalDriveStringsA
GetOEMCP
SuspendThread
GetThreadSelectorEntry
MultiByteToWideChar
GetDriveTypeW
GetEnvironmentStringsA
VirtualFree
GetUserDefaultLCID
SetStdHandle
WideCharToMultiByte
GetConsoleTitleW
LocalSize
EnumSystemLocalesA
GetModuleFileNameW
WriteFile
SetHandleCount
LCMapStringA
SetConsoleCtrlHandler
GetConsoleMode
ConnectNamedPipe
GetACP
SetConsoleCP
lstrcpyA
GetCurrentProcessId
GetStdHandle
GetConsoleOutputCP
FindAtomW
IsBadReadPtr
CommConfigDialogW
LocalAlloc
GetPriorityClass
GetSystemTimeAsFileTime
OutputDebugStringW
CreateFileA
ReadConsoleOutputCharacterW
DebugBreak
GetModuleFileNameA
GetCommandLineA
GetLocaleInfoW
GetEnvironmentStringsW
CompareStringA
RemoveDirectoryW
GetCPInfo
SetLastError
GetVersionExA
EnumResourceNamesW
InterlockedDecrement
GetConsoleTitleA
lstrcmp
IsDebuggerPresent
GetTempPathA
GetStartupInfoA
GetStringTypeA
ContinueDebugEvent
InterlockedExchange
GetShortPathNameW
IsValidCodePage
SetEnvironmentVariableA
GetThreadPriority
TlsGetValue
ReadFile
ExitProcess
WriteConsoleA
IsValidLocale
TlsAlloc
GetCurrentProcess
CreateNamedPipeW
QueryPerformanceCounter
GetCurrentThread
GetModuleHandleA
LeaveCriticalSection
TlsSetValue
FreeLibrary
SetVolumeLabelA
GetTimeFormatA
GetFileType
CreateEventA
FileTimeToSystemTime
OpenMutexA
GetTempFileNameA
OutputDebugStringA
GetTimeZoneInformation
GetProcessHeap
HeapDestroy
GetNumberFormatW
FreeEnvironmentStringsW
InterlockedIncrement
GetEnvironmentStrings
SetCurrentDirectoryW
VirtualProtectEx
GetPrivateProfileSectionNamesW
SetUnhandledExceptionFilter
WaitForSingleObjectEx
SetConsoleWindowInfo
GetLastError
CreateMutexA
GetProcAddress
GetConsoleCP
HeapFree
FileTimeToDosDateTime
InitializeCriticalSection
LoadLibraryW
TerminateProcess
FreeEnvironmentStringsA
DeleteCriticalSection
CreateRemoteThread
HeapAlloc
GetProcessAffinityMask
GetTickCount
TlsFree
VirtualQuery
EnterCriticalSection
FlushFileBuffers
GlobalFlags
shell32
SheChangeDirA
DragQueryFileAorW
FindExecutableA
user32
ExitWindowsEx
CreateWindowExA
EnumDesktopWindows
IsCharAlphaNumericA
DrawStateA
RegisterClassA
CheckRadioButton
IsDialogMessageW
DdeUninitialize
GetAsyncKeyState
GetWindowRect
SetCursor
SetProcessDefaultLayout
GetWindowDC
GetDC
GetCaretBlinkTime
ShowCaret
EnumDisplaySettingsExA
GetProcessDefaultLayout
ShowWindow
GetMenuItemInfoW
SubtractRect
DrawStateW
DestroyWindow
SwitchToThisWindow
EnumDisplaySettingsExW
GetClipboardFormatNameA
DdeInitializeW
GetMenuInfo
IsClipboardFormatAvailable
DlgDirSelectExA
GetDlgItem
CloseWindowStation
DdeSetUserHandle
GetClipboardOwner
MessageBoxA
CharToOemW
DefWindowProcW
EndPaint
GetTitleBarInfo
SendNotifyMessageW
DialogBoxIndirectParamA
MonitorFromRect
DdeCreateStringHandleW
DlgDirSelectExW
RegisterClassW
DrawIconEx
GetDesktopWindow
FillRect
RegisterClassExA
SystemParametersInfoA
RegisterHotKey
advapi32
LookupPrivilegeValueW
CryptDecrypt
InitiateSystemShutdownA
GetUserNameA
GetUserNameW
RegEnumValueA
LookupAccountSidA
CryptSignHashA
CryptSetProviderExA
RegEnumKeyExW
LookupAccountNameW
RegSetValueExA
RegCreateKeyExA
InitiateSystemShutdownW
RegLoadKeyW
RegCreateKeyA
RegQueryInfoKeyW
CryptSetHashParam
RegOpenKeyExW
RegCreateKeyExW
RegOpenKeyA
CryptSetProviderExW
RegQueryValueA
Sections
.text Size: 296KB - Virtual size: 294KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 172KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ