S:\LsjieSq\iaKainxfzwOvy\YlalzRyqvPl\nmpbkiohIJxjc\ypysgzoHhqcvMl.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f87adbbe045f9e260849b9f7c97c4e25_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f87adbbe045f9e260849b9f7c97c4e25_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f87adbbe045f9e260849b9f7c97c4e25_JaffaCakes118
-
Size
164KB
-
MD5
f87adbbe045f9e260849b9f7c97c4e25
-
SHA1
1b98f13538e0b77657f6eac81acba96665534c56
-
SHA256
c22f27edb12ac4450ba6d69b026e552ff73efd96dac84afa82d6a1bbe5eac4d0
-
SHA512
0dbb84aa9b6b92d59bc405464b858d267fec84806282b2771e0221bb72eab983f5c38c3f16a2a61de4027e0036ac557d46ddb626bad2a76f9e4aed5046201119
-
SSDEEP
3072:SmNJr5Yv8nWCJbUV47NS1B2SZ0bQTW3Gq88VnXkLaIpaHoeE/GlyzMj:hNJr5YvUoKEf2S+bONFaIpaHopA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f87adbbe045f9e260849b9f7c97c4e25_JaffaCakes118
Files
-
f87adbbe045f9e260849b9f7c97c4e25_JaffaCakes118.exe windows:5 windows x86 arch:x86
fbe27bb93aa0bdcaac570f12ec09fdfd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
StrTrimA
StrStrIA
user32
DeferWindowPos
SystemParametersInfoA
LoadMenuA
GetDlgCtrlID
LoadAcceleratorsA
wvsprintfW
LoadImageW
GetFocus
PostThreadMessageA
wvsprintfA
CharLowerA
GetMessageTime
IsCharAlphaA
LoadStringA
GetClassInfoA
CreateIconFromResource
GetMonitorInfoW
IsWindowUnicode
VkKeyScanA
GetWindowTextLengthW
DefWindowProcW
ChildWindowFromPointEx
SetScrollRange
DefWindowProcA
CharLowerW
RemovePropW
GetMenuItemCount
GetKeyState
kernel32
FindResourceExA
GetCurrentDirectoryW
GetWindowsDirectoryA
GetCommProperties
ClearCommError
CreateFileA
GetTickCount
OpenFileMappingW
GlobalGetAtomNameA
GetLastError
CreateEventA
HeapCreate
GetProcessHeap
HeapWalk
HeapAlloc
GetModuleFileNameA
CreateSemaphoreA
FindCloseChangeNotification
GetModuleHandleA
msvcrt
exit
gdi32
CreateRectRgn
OffsetRgn
CreateDIBitmap
GetTextCharsetInfo
SetTextColor
SetBitmapBits
MoveToEx
SelectClipRgn
EndDoc
GetTextExtentPoint32W
CreatePolygonRgn
CreateFontW
ScaleViewportExtEx
Exports
Exports
?ugkPj_hyq@@UGHJE@Z
Sections
.text Size: 153KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 281B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.$debug Size: 512B - Virtual size: 122B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data1 Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data2 Size: 512B - Virtual size: 386B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data3 Size: 1024B - Virtual size: 612B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data4 Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 278KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ