d:\kcxsvxze\olbzzlxeoq\wkstci\owz\axerzmtdq.pdb
Static task
static1
Behavioral task
behavioral1
Sample
05cca3dd51788d5f502d0b72bcbfac4e_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
05cca3dd51788d5f502d0b72bcbfac4e_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
05cca3dd51788d5f502d0b72bcbfac4e_JaffaCakes118
-
Size
494KB
-
MD5
05cca3dd51788d5f502d0b72bcbfac4e
-
SHA1
6e5ab3bdcd8334402511dcd1f1f1ee479021a8dc
-
SHA256
85c38c6b10445168a274c6d1913f063c1a3363cee3bfeeed35932673fa0e49d2
-
SHA512
01f3bf685ff3b817875d5ef07441df7f74c10f411deea8e0ad52038f08717388e678617e85bad9c01cd24735301065e5215121ae93c3715895ee766d17662f8e
-
SSDEEP
6144:TUzaY1cOyo97jt2bBK70vtvxIHMVKvHTSkHTszgiqjjopZ8Mt3oGp1x9R/bWEgo7:4znt9HAbM0vtvVtiThIPJ3ooRgro
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 05cca3dd51788d5f502d0b72bcbfac4e_JaffaCakes118
Files
-
05cca3dd51788d5f502d0b72bcbfac4e_JaffaCakes118.exe windows:4 windows x86 arch:x86
791ddbe121b87527077262b71bc8d867
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
advapi32
CryptGetDefaultProviderA
CryptGetHashParam
LookupPrivilegeNameW
RegReplaceKeyW
RegSetValueExA
RegQueryMultipleValuesA
CryptDecrypt
LookupPrivilegeDisplayNameW
CryptSetProviderA
CryptGenRandom
comdlg32
FindTextA
ChooseColorW
FindTextW
user32
RegisterClassExA
DispatchMessageW
RegisterClassA
wininet
SetUrlCacheConfigInfoA
InternetOpenUrlA
InternetLockRequestFile
GetUrlCacheHeaderData
ResumeSuspendedDownload
ShowX509EncodedCertificate
gdi32
GetEnhMetaFileW
PlayMetaFileRecord
SetMagicColors
GetWinMetaFileBits
CreateScalableFontResourceA
CancelDC
SelectClipPath
PtInRegion
EndPath
GetDIBits
CopyMetaFileA
GetStockObject
GetWorldTransform
GetKerningPairsA
GetKerningPairsW
OffsetClipRgn
CreateDiscardableBitmap
PathToRegion
EnumEnhMetaFile
kernel32
TlsSetValue
GetStartupInfoW
CompareStringW
FreeEnvironmentStringsW
MultiByteToWideChar
TlsFree
SetEndOfFile
CloseHandle
CreateSemaphoreW
GetDateFormatA
GetTimeFormatA
SetStdHandle
QueryPerformanceCounter
CreateMutexA
DeleteCriticalSection
RtlUnwind
SetLastError
OpenMutexA
EnumCalendarInfoExA
GetCurrentThread
GetModuleHandleA
GetModuleFileNameA
GetStartupInfoA
SetComputerNameA
WaitNamedPipeA
InterlockedExchange
SetHandleCount
GetModuleFileNameW
GetTickCount
WideCharToMultiByte
LoadLibraryA
IsBadWritePtr
HeapReAlloc
GetStringTypeW
GetLocaleInfoA
GetCommandLineA
LCMapStringA
FlushFileBuffers
GetStdHandle
GetSystemInfo
GetCurrentProcess
LCMapStringW
HeapCreate
FreeEnvironmentStringsA
GetFileType
HeapAlloc
GetNamedPipeHandleStateW
GetLocaleInfoW
VirtualQuery
GetCurrentProcessId
GetStringTypeA
SetThreadAffinityMask
GetSystemTimeAsFileTime
SetEnvironmentVariableA
UnhandledExceptionFilter
SetFilePointer
EnumSystemLocalesA
GetEnvironmentStrings
GetCPInfo
GetUserDefaultLCID
ExitProcess
LeaveCriticalSection
IsValidCodePage
GetExitCodeProcess
GetCommandLineW
HeapFree
TlsAlloc
GetVersionExA
VirtualFree
IsValidLocale
GetTimeZoneInformation
VirtualProtect
TlsGetValue
CompareStringA
TerminateProcess
EnterCriticalSection
WriteFile
ReadFile
InitializeCriticalSection
GetEnvironmentStringsW
HeapSize
GetCurrentThreadId
HeapDestroy
GetLastError
VirtualAlloc
GetProcAddress
GetOEMCP
LoadLibraryW
GetACP
Sections
.text Size: 306KB - Virtual size: 306KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 65KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ