d:\ejemmq\exdioud.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0026c4ff5feaa157aa416eccf564dbe1_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0026c4ff5feaa157aa416eccf564dbe1_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0026c4ff5feaa157aa416eccf564dbe1_JaffaCakes118
-
Size
569KB
-
MD5
0026c4ff5feaa157aa416eccf564dbe1
-
SHA1
4d70894b4e62a05a84ebfb983a65f0a92773c12f
-
SHA256
39618f337f7bf1898c91262cb3db90931ad9e88fae88ae5aaf88b661a0ebeddb
-
SHA512
22d417d93a4f59ff2931e7cbd99fbdaa37b3d6ef03c6c360678ccec56d4d2b7a2c67d2d408a160194dc39ee78a2bc2531f98f552dc590af00719943183e01a88
-
SSDEEP
12288:IOGBiQ/ddWubtVvda/6PLzjb+z2dZGyEEqhpoYdZ4rV:IOGBiQ2kfY/ULzjb+z2ifpzdZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0026c4ff5feaa157aa416eccf564dbe1_JaffaCakes118
Files
-
0026c4ff5feaa157aa416eccf564dbe1_JaffaCakes118.exe windows:4 windows x86 arch:x86
6b1f760c14d48a226e4afb5b926fbc79
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_SetOverlayImage
ImageList_Copy
ImageList_Draw
InitCommonControlsEx
CreatePropertySheetPageA
user32
EndDeferWindowPos
IsCharAlphaW
DdeImpersonateClient
RegisterClassExA
ToAscii
GetKBCodePage
IsWindowEnabled
RemoveMenu
CharLowerW
DdeCmpStringHandles
CloseDesktop
SetTimer
GetClassWord
RegisterClassA
SetCursorPos
OpenClipboard
ChangeMenuA
GetSysColor
kernel32
HeapAlloc
HeapCreate
GetACP
GetModuleFileNameA
GetProcAddress
QueryPerformanceCounter
UnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
VirtualAlloc
OpenMutexA
IsValidLocale
GetSystemTimeAsFileTime
GetCurrentProcessId
GetStringTypeW
HeapSize
GetStringTypeA
GetStdHandle
ExitProcess
HeapDestroy
GetOEMCP
GetConsoleOutputCP
TerminateProcess
CreateSemaphoreW
ReleaseSemaphore
GetCurrentThread
LCMapStringW
SetEnvironmentVariableA
LoadLibraryA
SetConsoleCtrlHandler
VirtualQuery
EnumSystemLocalesA
InterlockedExchange
GetTimeZoneInformation
WriteConsoleW
GetCommandLineA
GetEnvironmentStringsW
ReadConsoleOutputCharacterW
SetStdHandle
CreateFileA
GetLocaleInfoW
lstrlenW
GetModuleHandleA
GetEnvironmentStrings
SetUnhandledExceptionFilter
TlsGetValue
AddAtomA
GetFileType
GetTimeFormatA
TlsAlloc
HeapReAlloc
FreeLibrary
GetTempPathW
IsValidCodePage
IsDebuggerPresent
GetLocaleInfoA
LCMapStringA
EnterCriticalSection
GetModuleHandleW
GetStartupInfoA
GetConsoleMode
GetLastError
OutputDebugStringW
SetFilePointer
SetHandleCount
LeaveCriticalSection
GetDateFormatA
GetLogicalDriveStringsW
RtlUnwind
WritePrivateProfileSectionA
DeleteCriticalSection
SetLastError
CreateMutexA
WriteConsoleA
FlushFileBuffers
GetConsoleCP
FillConsoleOutputAttribute
TlsSetValue
CloseHandle
VirtualFree
InterlockedIncrement
GetEnvironmentStringsA
LocalSize
WriteConsoleInputA
FreeEnvironmentStringsW
CompareStringW
CommConfigDialogA
ReadFile
WriteFile
WideCharToMultiByte
TlsFree
GetCPInfo
SetVolumeLabelA
FreeEnvironmentStringsA
MultiByteToWideChar
Sleep
GetCurrentProcess
GetUserDefaultLCID
CompareStringA
HeapFree
FileTimeToSystemTime
FindResourceExW
InterlockedDecrement
GetTickCount
Sections
.text Size: 341KB - Virtual size: 341KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ