k:\kghqiemp\jekwev\bovans\zvkhpcjelz\xtveyqfpxy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fa7dc8402ec5f4bce5f7ab944c10f5cb_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fa7dc8402ec5f4bce5f7ab944c10f5cb_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fa7dc8402ec5f4bce5f7ab944c10f5cb_JaffaCakes118
-
Size
564KB
-
MD5
fa7dc8402ec5f4bce5f7ab944c10f5cb
-
SHA1
2d4e461890af85a5476144ec2d6dcfb1ed3dc565
-
SHA256
498eb96f05a3f9ae39ea5991e42f0d1b7cfde8c7175f485c153cd41bdfcbd1b7
-
SHA512
b18a8cc6b42d477402019e101027fcb0c0207236e703f19cd27f42ca5ac618aa5083b9c1356d21f22de4407a7f7efae881471163334feb10d1ce98d63aa0af67
-
SSDEEP
12288:cAihY+TRMdzKDAPUxCHdjueIEgU/Cxiu6y9Kwpg+:xZ+TRMiGXKr/q8iunKW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fa7dc8402ec5f4bce5f7ab944c10f5cb_JaffaCakes118
Files
-
fa7dc8402ec5f4bce5f7ab944c10f5cb_JaffaCakes118.exe windows:4 windows x86 arch:x86
c6fb8947499dde7d19b874d5f2c1e893
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_Destroy
ImageList_Draw
CreatePropertySheetPage
ImageList_GetDragImage
ImageList_BeginDrag
ImageList_AddIcon
ImageList_GetImageInfo
InitCommonControlsEx
ImageList_GetFlags
ImageList_Add
ImageList_SetOverlayImage
ImageList_Replace
user32
IsDialogMessage
DdeQueryStringA
MessageBeep
GetTitleBarInfo
IsCharUpperW
MapVirtualKeyExW
InvertRect
LoadBitmapW
GetKeyboardLayout
FindWindowExA
FindWindowW
SetWindowTextW
ShowCursor
InSendMessageEx
DdeGetLastError
RemoveMenu
DrawCaption
CreateAcceleratorTableW
GetWindowThreadProcessId
SetCaretBlinkTime
GetAsyncKeyState
CreateWindowStationA
RegisterClassExA
CreateWindowExA
DlgDirListComboBoxW
GetKeyState
ShowWindow
WaitMessage
GetMonitorInfoW
OpenWindowStationA
GetWindowTextLengthW
TileChildWindows
GetDlgCtrlID
CharToOemBuffW
GetNextDlgTabItem
ChangeDisplaySettingsExA
LoadKeyboardLayoutA
OemKeyScan
CloseWindow
LoadStringW
TranslateMessage
RegisterClipboardFormatW
GetWindowRgn
CharNextW
DragObject
ToUnicodeEx
DefMDIChildProcA
SetDlgItemTextW
IsCharAlphaA
CharUpperBuffA
DestroyWindow
WINNLSGetEnableStatus
UnregisterDeviceNotification
SwitchToThisWindow
RegisterClassA
DrawEdge
SetShellWindow
RedrawWindow
GetKeyboardLayoutNameW
MessageBoxW
GetMenuDefaultItem
DefFrameProcA
DefWindowProcA
HideCaret
DefFrameProcW
EnumDisplayDevicesA
DdeQueryStringW
DdeAccessData
RegisterDeviceNotificationW
kernel32
VirtualFree
GetStdHandle
SetStdHandle
lstrcpyA
HeapDestroy
GetCurrentThreadId
InitializeCriticalSection
LeaveCriticalSection
HeapCreate
TerminateProcess
GetCurrentProcess
GetCPInfo
HeapFree
GetLocalTime
OpenMutexA
RtlZeroMemory
GetPrivateProfileStructW
GetEnvironmentStringsW
LCMapStringA
GetACP
TlsFree
SetEnvironmentVariableA
TlsSetValue
SetFileAttributesW
GlobalFindAtomW
GetModuleFileNameA
GetOEMCP
WaitCommEvent
GetStringTypeW
WriteFile
UnhandledExceptionFilter
MultiByteToWideChar
GetModuleHandleA
GetEnvironmentStrings
GetStringTypeA
GetPrivateProfileSectionA
GlobalAddAtomA
GetCurrentDirectoryW
GetFileType
GetSystemTimeAsFileTime
GetCurrentProcessId
InterlockedDecrement
LoadLibraryA
HeapAlloc
SetFilePointer
CreateNamedPipeW
LocalFlags
SetLastError
GlobalUnfix
GlobalUnlock
GetTimeZoneInformation
WideCharToMultiByte
GetProfileStringW
WriteConsoleOutputW
VirtualAlloc
InterlockedIncrement
EnumResourceNamesA
LCMapStringW
GetSystemTime
AllocConsole
GetVersion
GetFileAttributesW
GetCommandLineA
IsValidCodePage
lstrcmp
GetFileAttributesExW
TlsAlloc
GetProcAddress
GetAtomNameW
CloseHandle
WriteConsoleA
ReadFile
ExitProcess
TlsGetValue
FlushFileBuffers
DeleteCriticalSection
HeapReAlloc
InterlockedExchange
GetTimeFormatW
SleepEx
OpenWaitableTimerW
CreateMutexA
FreeEnvironmentStringsW
CompareStringA
GetLastError
WritePrivateProfileSectionW
CompareStringW
FreeEnvironmentStringsA
IsBadWritePtr
GetStartupInfoA
EnterCriticalSection
GetDiskFreeSpaceW
WaitForMultipleObjectsEx
GetTempPathA
GetLogicalDriveStringsW
RtlUnwind
LocalUnlock
VirtualQuery
QueryPerformanceCounter
WaitNamedPipeA
SetHandleCount
GetCurrentThread
lstrcmpi
GetTickCount
GetCalendarInfoA
SetLocaleInfoA
SetVolumeLabelA
GetFullPathNameW
GetSystemInfo
advapi32
RegDeleteValueA
RegNotifyChangeKeyValue
StartServiceW
RegConnectRegistryA
RegEnumKeyExA
AbortSystemShutdownW
CryptDecrypt
CryptImportKey
RegReplaceKeyA
comdlg32
FindTextA
PageSetupDlgW
ReplaceTextA
Sections
.text Size: 172KB - Virtual size: 170KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 248KB - Virtual size: 245KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ