J:\rahiMtrbSct\zXbbObKc\kILccwyq\oKokvtmFOsd\tdkjZusyyoK.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0578c60f5df68f714411246ecaa13f3b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0578c60f5df68f714411246ecaa13f3b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0578c60f5df68f714411246ecaa13f3b_JaffaCakes118
-
Size
173KB
-
MD5
0578c60f5df68f714411246ecaa13f3b
-
SHA1
961ca493353522ce56d11473ef2f385ab60ff7c9
-
SHA256
af74f143df64ce41b7c408ae3466e2f45d8b6a1746ae50971fbde27accca4436
-
SHA512
d1a106fbc506d79b076bfa2c22c7b7aabda27faff32a50f9cf8d338356f32110d4079fc6036cc3316ff702ce0f30be7e472523b5b32ef4773929658bb438b47a
-
SSDEEP
3072:rUchwevANucd+bgRhHylf50gdOw9FrLSbwGns0RreoVNLWMPfK2:wchweINr06HylXN9FKnjqMPfK2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0578c60f5df68f714411246ecaa13f3b_JaffaCakes118
Files
-
0578c60f5df68f714411246ecaa13f3b_JaffaCakes118.exe windows:5 windows x86 arch:x86
700f820e654acfdabadbc7b85e6eee11
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
wcstod
bsearch
__set_app_type
__p__fmode
__p__commode
_amsg_exit
_initterm
_acmdln
exit
localtime
_ismbblead
floor
strtol
wcscmp
system
wcscpy
strerror
_XcptFilter
islower
wcsstr
_exit
strpbrk
_cexit
__setusermatherr
__getmainargs
user32
SetCaretPos
CallWindowProcW
GetWindow
DispatchMessageA
AppendMenuW
CreateWindowExW
SetLastErrorEx
GetDoubleClickTime
GetCaretPos
ShowOwnedPopups
IsChild
DialogBoxParamW
TranslateAcceleratorW
SetWindowTextA
DrawIcon
SetWindowLongA
LoadMenuW
CopyRect
SetMenuDefaultItem
CharUpperA
TrackPopupMenuEx
SetWindowLongW
CheckMenuItem
CopyImage
CreateCursor
InSendMessageEx
GetKeyNameTextW
DrawIconEx
GetWindowLongW
SetParent
DeferWindowPos
DestroyMenu
ScrollWindowEx
LoadMenuA
GetWindowPlacement
MapVirtualKeyExW
IsWindowEnabled
SetCursor
GetKeyState
wsprintfA
GetMenuItemRect
OpenIcon
kernel32
GetOEMCP
SetHandleCount
GetUserDefaultUILanguage
GetComputerNameW
EnumResourceNamesA
SetCommTimeouts
GetLongPathNameW
GetWindowsDirectoryW
GetModuleHandleA
VirtualFree
DisconnectNamedPipe
GlobalMemoryStatusEx
GetShortPathNameW
lstrcpyA
WriteFile
lstrcmpiA
FlushFileBuffers
RegisterWaitForSingleObject
WaitForSingleObjectEx
LoadLibraryW
ResumeThread
lstrlenA
gdi32
ScaleWindowExtEx
GetSystemPaletteEntries
GetTextExtentPointA
CreateFontA
EndPath
MoveToEx
CreateCompatibleBitmap
BeginPath
SetROP2
GetSystemPaletteUse
FillRgn
EndDoc
CreateHalftonePalette
TranslateCharsetInfo
GetTextMetricsA
StretchBlt
GetViewportOrgEx
GetCharWidth32W
shlwapi
StrToIntExA
StrCatBuffA
Exports
Exports
?SectionOriginal@@YGIIPAFPANK~U
?ExecuteLoaderTrayXBwyGD@@YGKGHE@Z
?GenerateFolderOriginal@@YGGHDPAH~U
?IsProjectNew@@YGIPANEE~U
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ticx Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kip Size: 512B - Virtual size: 492B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ticy Size: 512B - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zdata Size: 512B - Virtual size: 204B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.heap Size: - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 145KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ