V:\lgcgmzPgIyu\uywZshca\taxsViqUjErDur\ryeyvuaI\otswnVYaxWfs.pdb
Static task
static1
Behavioral task
behavioral1
Sample
01042aa25a55c2d27198b5f6032cc7ff_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
01042aa25a55c2d27198b5f6032cc7ff_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
01042aa25a55c2d27198b5f6032cc7ff_JaffaCakes118
-
Size
147KB
-
MD5
01042aa25a55c2d27198b5f6032cc7ff
-
SHA1
1c09011f2504cd5c8492f4367090e0fde7ad2d2e
-
SHA256
f78fef344762392e0715bdbca490531034c71d2928aa9a05b1f5e5a4f775f037
-
SHA512
29752c6194eada0006f69041df1df7756eb08f44d75936dadab6cd16939e7800d23c2b7d42e34a19fd66a0639e0156afbff38fa5f3369045931259f493706195
-
SSDEEP
3072:Jw7sRjfSmstjvxIAzzDDLACXwjuPprGB4ZRX/XBpKwV:OPt7xIAP3LxXw6PprGB4Zx/XBQw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01042aa25a55c2d27198b5f6032cc7ff_JaffaCakes118
Files
-
01042aa25a55c2d27198b5f6032cc7ff_JaffaCakes118.exe windows:5 windows x86 arch:x86
b5eeb655ded01bab78bf6ce5425ef27d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
InSendMessageEx
DrawStateW
SetActiveWindow
TrackPopupMenuEx
HiliteMenuItem
CallWindowProcA
SetMenu
ModifyMenuW
DispatchMessageA
FrameRect
MoveWindow
GetIconInfo
SetDlgItemTextA
AppendMenuW
GetScrollPos
DestroyMenu
DefFrameProcW
CopyAcceleratorTableW
CreateWindowExW
IsRectEmpty
GetKeyboardLayout
GetKeyboardType
DrawTextW
DrawMenuBar
GetMenuItemCount
MapDialogRect
SetDlgItemTextW
SetScrollPos
CharLowerW
ToUnicodeEx
EnableMenuItem
EqualRect
DrawAnimatedRects
AdjustWindowRect
CharToOemW
CheckMenuItem
DestroyCursor
DialogBoxIndirectParamA
GetScrollInfo
EnumChildWindows
PostThreadMessageA
CreateIconIndirect
GetSubMenu
IsCharAlphaNumericW
SetMenuDefaultItem
GetDlgCtrlID
GetActiveWindow
PostQuitMessage
CheckRadioButton
HideCaret
SendDlgItemMessageA
CharNextExA
WaitMessage
LoadMenuA
DestroyIcon
GetClassLongW
MapVirtualKeyExW
GetMenu
keybd_event
LoadAcceleratorsA
SetLastErrorEx
SetCursor
ShowWindowAsync
LoadBitmapW
CharUpperBuffW
ChildWindowFromPointEx
GetWindowLongA
IsMenu
InternalGetWindowText
TabbedTextOutW
LoadCursorA
InvertRect
DefWindowProcW
GetMessageA
ChangeMenuW
wsprintfW
SetTimer
ValidateRect
GetScrollRange
mouse_event
SendMessageTimeoutA
DrawTextExW
ArrangeIconicWindows
SetRect
GetSystemMenu
InSendMessage
GetWindowTextLengthW
TranslateAcceleratorW
LoadAcceleratorsW
SetWindowTextW
LookupIconIdFromDirectory
SetDlgItemInt
CharUpperBuffA
SetWindowPos
GetClassNameW
RegisterHotKey
SetMenuItemBitmaps
IsWindow
PostMessageA
GetNextDlgGroupItem
KillTimer
GetClassInfoA
TranslateMessage
DispatchMessageW
VkKeyScanW
OffsetRect
IsCharLowerA
GetMenuCheckMarkDimensions
MessageBoxW
GetUpdateRgn
RedrawWindow
LoadCursorW
GetNextDlgTabItem
CharPrevA
WaitForInputIdle
SendNotifyMessageW
OpenDesktopW
GetWindowTextW
LoadStringA
MapWindowPoints
shlwapi
StrToIntW
msvcrt
_controlfp
mbstowcs
isalnum
__set_app_type
clearerr
wcscmp
putc
wcschr
__p__fmode
wcstok
vsprintf
__p__commode
wcscat
_amsg_exit
_initterm
toupper
iswspace
mktime
fread
wcslen
mbtowc
wcstod
puts
_ismbblead
getc
fseek
atoi
ungetc
_XcptFilter
localtime
isprint
strtol
_exit
wcstol
malloc
fwrite
wcscoll
setvbuf
strspn
wcsstr
_cexit
__setusermatherr
remove
__getmainargs
isspace
iswdigit
fputc
kernel32
CreateSemaphoreA
LoadLibraryA
SetSystemTimeAdjustment
CancelWaitableTimer
GetSystemDefaultUILanguage
FileTimeToSystemTime
CreateFileA
GetCurrentThreadId
GetOEMCP
GlobalSize
IsDBCSLeadByte
lstrcmpiA
ClearCommError
GetLastError
FindFirstFileA
HeapLock
MoveFileExW
SetThreadContext
GetCommandLineW
GlobalAddAtomA
SetHandleInformation
WaitForMultipleObjects
ConnectNamedPipe
TryEnterCriticalSection
CreateSemaphoreW
FormatMessageW
LoadLibraryExA
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetThreadLocale
GlobalMemoryStatus
LocalUnlock
SetLocalTime
MoveFileW
HeapAlloc
GetFileAttributesExW
AreFileApisANSI
OutputDebugStringA
FlushViewOfFile
GetACP
GetTempPathA
GetSystemTimeAsFileTime
AddAtomW
GetModuleFileNameA
GlobalDeleteAtom
SetThreadLocale
GetSystemWindowsDirectoryA
LockFile
CreateNamedPipeA
FlushFileBuffers
GlobalFlags
CreateEventW
GetUserDefaultLangID
GetFileInformationByHandle
LocalReAlloc
GetPriorityClass
Exports
Exports
?RedirectOutput@@YGK_KHE:O
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.itab Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.etab Size: 512B - Virtual size: 85B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.input Size: 1024B - Virtual size: 640B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 115KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ