Q:\pose\relaying\specialized\compl.pdb
Static task
static1
Behavioral task
behavioral1
Sample
139e45cefa3527737d5406de8f6ad1b9_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
139e45cefa3527737d5406de8f6ad1b9_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
139e45cefa3527737d5406de8f6ad1b9_JaffaCakes118
-
Size
381KB
-
MD5
139e45cefa3527737d5406de8f6ad1b9
-
SHA1
24f1c6025fd7bc6121fa1eecda5b38ebc8c92d53
-
SHA256
cc232b7d5ea2d598601667fa91ac6d37097a33da86d1cb5ed97bb0bfc0e0ba39
-
SHA512
c8d8476b332c92045fcbfdda2842fead425aecc76c7c2b49efbf8e5529caacea19ec7b9ddc358df37f3534395505103cf90145d93d0afe56fa4d04b382adf652
-
SSDEEP
6144:w4UiyEhomq+UAmdaqzsMbjIFdUpTxaVyTdc7HWggRqd/2ZUYaPw:w4ZJoB+MdhzsbkvaVs9n6Xw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 139e45cefa3527737d5406de8f6ad1b9_JaffaCakes118
Files
-
139e45cefa3527737d5406de8f6ad1b9_JaffaCakes118.exe windows:5 windows x86 arch:x86
fafe63dbea15128fc5a7e896ab9f538a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NO_BIND
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_NET_RUN_FROM_SWAP
PDB Paths
Imports
kernel32
OpenEventA
GetModuleFileNameA
CloseHandle
OpenFileMappingA
CreateThread
lstrcpyA
LocalFileTimeToFileTime
SetStdHandle
WriteConsoleW
SetFilePointer
FlushFileBuffers
GetConsoleMode
GetConsoleCP
HeapReAlloc
HeapSize
RtlUnwind
IsProcessorFeaturePresent
Sleep
GetStringTypeW
LCMapStringW
RaiseException
GetSystemTimeAsFileTime
LoadLibraryA
GetFileSize
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
LoadLibraryW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
HeapCreate
GetModuleFileNameW
GetStdHandle
WriteFile
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
GetLocalTime
GetProcAddress
GetLastError
GlobalUnlock
lstrcatA
ReadFile
CreateEventA
GetVolumeInformationA
GlobalAlloc
GetDateFormatA
SetEvent
WaitForSingleObject
GetUserDefaultLCID
GlobalLock
HeapFree
SystemTimeToFileTime
HeapAlloc
MapViewOfFile
GetCurrentProcessId
lstrlenA
TlsGetValue
TlsAlloc
CreateFileA
GetTickCount
EncodePointer
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetCommandLineA
DecodePointer
ExitProcess
GetModuleHandleW
MultiByteToWideChar
CreateFileW
user32
GetDlgCtrlID
DialogBoxParamA
GetScrollPos
ReleaseCapture
DispatchMessageA
ShowWindow
GetMenuItemInfoA
CheckMenuItem
UpdateWindow
GetWindow
MoveWindow
LoadCursorA
GetCursorPos
GetSysColor
GetDesktopWindow
DefWindowProcA
GetMenuState
ReleaseDC
CreateWindowExA
GetWindowLongA
InvalidateRect
EndPaint
GetMessageA
InvertRect
SetWindowRgn
SetTimer
ScreenToClient
GetWindowRect
RegisterClassExA
PostQuitMessage
SetCapture
KillTimer
LoadIconA
GetClientRect
SetRectEmpty
BeginPaint
PtInRect
GetDC
TranslateMessage
GetMenu
GetWindowTextA
CheckMenuRadioItem
SetWindowLongA
gdi32
MoveToEx
GetGlyphOutlineA
LineTo
DescribePixelFormat
SetTextColor
GetOutlineTextMetricsA
SetBkMode
DeleteObject
SelectObject
CombineRgn
SetMapMode
Rectangle
ExtTextOutW
SetPolyFillMode
CreatePen
GetTextMetricsA
GetFontData
CreateSolidBrush
CreateEllipticRgn
winspool.drv
GetJobA
comdlg32
FindTextA
ole32
CoInitialize
CoGetMarshalSizeMax
GetHGlobalFromStream
CoTaskMemAlloc
CreateStreamOnHGlobal
CoCreateInstance
CoMarshalInterface
oleaut32
UnRegisterTypeLi
OleSavePictureFile
CreateStdDispatch
OleLoadPicture
winscard
SCardLocateCardsA
SCardGetStatusChangeA
SCardReleaseContext
SCardListReadersA
SCardFreeMemory
SCardEstablishContext
credui
CredUIPromptForCredentialsA
shlwapi
StrPBrkA
PathFindExtensionA
PathFindFileNameA
eappcfg
EapHostPeerFreeMemory
EapHostPeerFreeErrorMemory
EapHostPeerGetMethods
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 204KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 30KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ