I:\IxgUwsnp\xnrkuCBzuhxyA\VsnuYvoalGzm\yeXnZKhcKsqVle\Tabrxlgxt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fece556e27cc0100294f0a2cb1826e8f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fece556e27cc0100294f0a2cb1826e8f_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fece556e27cc0100294f0a2cb1826e8f_JaffaCakes118
-
Size
137KB
-
MD5
fece556e27cc0100294f0a2cb1826e8f
-
SHA1
b0f53f8156ffcbf77e4cd111b447a89c06b5fda8
-
SHA256
06899bfa690db48df1288c910f5557f13178b8ec9b1ce8eae3c6aeefdf030c1e
-
SHA512
fe18c2d6083cc301595c017896cc094150bc1b0fd3aa9a24e09272239b128b19e2abf91af451c674299324afa16075d2e5407c5da7bc6967316de1ea5b747e1e
-
SSDEEP
3072:PF6E95TF/miPoYpaJF+9FoKd2AoSA0u4t8a+oolCj1SyIywlyVq:9DvNQ0aD+QKd4R0u49+LlCEyF7M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fece556e27cc0100294f0a2cb1826e8f_JaffaCakes118
Files
-
fece556e27cc0100294f0a2cb1826e8f_JaffaCakes118.exe windows:5 windows x86 arch:x86
9446a92b23572bbd6c737e05cc57ca45
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntdll
memset
kernel32
GetTickCount
GetModuleFileNameA
RemoveDirectoryA
GetModuleHandleA
GetModuleHandleW
CopyFileW
LocalUnlock
LocalReAlloc
FindClose
HeapAlloc
GetComputerNameExW
DeleteCriticalSection
FreeLibrary
SetNamedPipeHandleState
GetProcessHeap
FindNextChangeNotification
shlwapi
ord29
StrRChrA
PathRelativePathToA
StrTrimA
user32
EndPaint
ArrangeIconicWindows
DefFrameProcW
GetClassNameW
DialogBoxIndirectParamA
keybd_event
WaitForInputIdle
EnableWindow
DestroyCursor
OpenInputDesktop
DrawFrameControl
GetMenuStringA
VkKeyScanA
DialogBoxParamA
PostMessageA
GetMenuItemRect
GetClientRect
CharPrevA
GetClassInfoExW
UpdateWindow
SetRectEmpty
GetSystemMenu
InvertRect
CharLowerA
GetScrollInfo
DrawEdge
IsCharAlphaA
CharUpperBuffW
gdi32
SetViewportOrgEx
GetCurrentObject
LPtoDP
ResizePalette
GetTextExtentPoint32A
PtVisible
CreateBitmapIndirect
LineTo
CreateFontIndirectA
EndPath
RestoreDC
PathToRegion
comdlg32
ChooseColorW
GetFileTitleW
PrintDlgW
GetOpenFileNameW
comctl32
InitCommonControlsEx
ImageList_GetIcon
CreatePropertySheetPageA
CreatePropertySheetPageW
msvcrt
exit
Exports
Exports
?jidZLxctsyndidgu_@@YGGPAJ@Z
Sections
.text Size: 127KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 98B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.$debug Size: 512B - Virtual size: 120B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data1 Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data2 Size: 512B - Virtual size: 434B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data3 Size: 512B - Virtual size: 404B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data4 Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ