iexpress.pdb
Behavioral task
behavioral1
Sample
0202da71bd642beb00d5939d6e2ab78a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0202da71bd642beb00d5939d6e2ab78a_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
0202da71bd642beb00d5939d6e2ab78a_JaffaCakes118
-
Size
329KB
-
MD5
0202da71bd642beb00d5939d6e2ab78a
-
SHA1
c3f74ca6e0a7435b6c22a5b8a0be8db2ec3dbb0b
-
SHA256
15dfec6d1d3ed25200da0857aa52a3bca12d1d99e2c2fd07ce9c6c97c8fdd2f1
-
SHA512
1217827cffcae6116feb7c6bed291f5d3950c5e463bbb04879469199b9d559ec3d824fc13b400a1b91ad771191e85933d601f8dad2ee8248193ae1a1c30135ab
-
SSDEEP
6144:2CbHv16+3FEEHONDGOb+asEwv5LS9+jfRP69aI:dHY6Cbuv5LS9+9ca
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0202da71bd642beb00d5939d6e2ab78a_JaffaCakes118
Files
-
0202da71bd642beb00d5939d6e2ab78a_JaffaCakes118.exe windows:6 windows x86 arch:x86
4e3268e798648364a203c0945e0a12d0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFullPathNameA
GetPrivateProfileSectionA
SetFileAttributesA
GetFileAttributesA
CreateDirectoryA
GetSystemInfo
GetShortPathNameA
WriteFile
DeleteFileA
ReadFile
FormatMessageA
GetLastError
GetExitCodeProcess
CreateProcessA
GetUserDefaultUILanguage
CopyFileA
_llseek
_lread
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileInformationByHandle
GlobalAlloc
WritePrivateProfileSectionA
GlobalUnlock
GlobalLock
SetLastError
_lwrite
FreeResource
LockResource
LoadResource
SizeofResource
FindResourceExA
GetTickCount
_lclose
MoveFileA
GetTempPathA
GetTempFileNameA
EnumResourceLanguagesA
lstrlenA
FreeLibrary
EnumResourceTypesA
CreateFileA
GetCurrentDirectoryA
GetSystemTime
MultiByteToWideChar
WideCharToMultiByte
CompareStringA
lstrcmpiA
LocalAlloc
GetModuleFileNameA
GlobalFree
GetVersionExA
LoadLibraryExW
FindResourceExW
IsDBCSLeadByte
FlushFileBuffers
GetLocaleInfoW
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
VirtualQuery
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetConsoleMode
GetConsoleCP
SetFilePointer
CreateFileMappingW
Sleep
InitializeCriticalSection
OpenEventA
WritePrivateProfileStringA
GetPrivateProfileIntA
FindFirstFileA
FindClose
GetPrivateProfileStringA
EnumResourceNamesA
lstrcmpA
WaitForSingleObject
LoadLibraryA
SearchPathW
GetSystemDefaultUILanguage
GetVersionExW
CreateFileW
CloseHandle
LocalFree
GetModuleHandleW
GetProcAddress
LoadLibraryExA
GetVersion
GetCommandLineA
GetStartupInfoA
HeapFree
HeapAlloc
SetUnhandledExceptionFilter
GetModuleHandleA
ExitProcess
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
GetCurrentThreadId
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
OutputDebugStringA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
gdi32
DeleteObject
GetDeviceCaps
GetObjectA
CreateFontIndirectA
GetStockObject
user32
CharPrevA
CheckRadioButton
GetWindowRect
CheckDlgButton
IsDlgButtonChecked
GetDlgItemTextA
SetDlgItemTextA
PostMessageA
SetFocus
MessageBeep
MessageBoxA
GetSystemMetrics
SendDlgItemMessageA
CharNextA
GetDC
ReleaseDC
SendMessageA
LoadStringA
MsgWaitForMultipleObjects
DispatchMessageA
PeekMessageA
GetParent
GetDlgItem
EnableWindow
CallWindowProcA
GetWindowLongA
SetWindowLongA
ShowWindow
ntdll
RtlUnwind
comctl32
PropertySheetA
CreatePropertySheetPageA
DestroyPropertySheetPage
comdlg32
GetOpenFileNameA
GetSaveFileNameA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
imagehlp
CheckSumMappedFile
advapi32
RegQueryValueExW
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExW
Sections
.text Size: 118KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE