R:\lhOcEafW\bcMjTlwUnsxpZ\eauixzlOhFdktj\ddaeulGZquh.pdb
Static task
static1
Behavioral task
behavioral1
Sample
07c35ee6a49f1388724b19618b51244f_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
07c35ee6a49f1388724b19618b51244f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
07c35ee6a49f1388724b19618b51244f_JaffaCakes118
-
Size
165KB
-
MD5
07c35ee6a49f1388724b19618b51244f
-
SHA1
aa341f91cd7fd4869797e6e7951ab57d78190429
-
SHA256
7e6268021a9cace9b637f6c19f6b126407adb3f98829e6af235f32f06c4c0b89
-
SHA512
f386ce2eb183d75cc15e965d351ec0cbf9e26bbad0b96e8619b18bff610e60efd786fe0928b7c5f019da2f957a2e85af7e95edd41ec674ced05f6c0e78dd5cbd
-
SSDEEP
3072:MsQSvwQqmaOHAEGi8mQWMwNzvxMF4hmzfBARl9KwyC+Re3aEi+M8:NhomaOHApPqLxyGm9AR3Kwyaf9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07c35ee6a49f1388724b19618b51244f_JaffaCakes118
Files
-
07c35ee6a49f1388724b19618b51244f_JaffaCakes118.exe windows:5 windows x86 arch:x86
b2454ca5160dd8a315b367bc18b47d70
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
wvsprintfA
IsDialogMessageA
CharNextW
FrameRect
LoadCursorA
SystemParametersInfoW
MonitorFromPoint
LoadMenuW
GetMessageExtraInfo
EnableMenuItem
KillTimer
DrawStateA
CreateDialogParamA
SetCursorPos
CheckRadioButton
CheckMenuItem
ModifyMenuW
DrawFrameControl
DrawIconEx
CreateAcceleratorTableW
OemToCharBuffA
GetMonitorInfoW
CharToOemBuffA
ExitWindowsEx
GetWindowDC
ChildWindowFromPoint
LoadMenuA
ClipCursor
PostThreadMessageW
AppendMenuA
GetClassLongA
SetTimer
RegisterHotKey
GetUpdateRect
InsertMenuItemW
ScrollWindow
ShowCursor
DestroyCaret
SetClassLongW
GetClassLongW
CharUpperA
TranslateMessage
DefDlgProcA
GetDialogBaseUnits
OpenDesktopW
UpdateWindow
ReplyMessage
GetCaretPos
GetTopWindow
CallWindowProcA
VkKeyScanA
SetMenuItemInfoW
EndPaint
FindWindowA
TranslateAcceleratorA
SetDlgItemTextW
CopyImage
CharUpperW
InternalGetWindowText
wsprintfA
CharPrevA
AllowSetForegroundWindow
keybd_event
IsCharAlphaW
GetForegroundWindow
LoadAcceleratorsW
ActivateKeyboardLayout
CreateWindowExA
GetMenu
GetDlgItemInt
GetMenuItemRect
DeleteMenu
TileWindows
ShowOwnedPopups
mouse_event
DrawEdge
VkKeyScanW
EndDialog
ArrangeIconicWindows
SetForegroundWindow
GetActiveWindow
GetMenuStringA
DialogBoxIndirectParamW
SendMessageTimeoutW
GetKeyboardLayoutList
IsWindowVisible
MessageBoxA
GetKeyNameTextW
InsertMenuA
SetWindowTextA
CharLowerA
GetMenuItemCount
GetKeyboardType
ChildWindowFromPointEx
SetRectEmpty
SetWindowPlacement
GetSysColor
MessageBoxExW
CreateCaret
MapVirtualKeyW
DestroyCursor
GetWindowTextA
GetNextDlgTabItem
CharPrevW
ShowWindowAsync
GetMenuItemID
SetMenuDefaultItem
CharToOemA
IsWindowEnabled
MessageBoxExA
CreatePopupMenu
IsCharAlphaNumericW
GetScrollRange
SetFocus
SendMessageW
InvalidateRect
SetMenuItemBitmaps
ToUnicodeEx
OffsetRect
UnloadKeyboardLayout
GetKeyState
PeekMessageA
IsCharAlphaA
DialogBoxParamA
kernel32
HeapSize
CreateFileA
SetTimerQueueTimer
TransactNamedPipe
LocalReAlloc
SetThreadContext
DeleteFileA
FindNextFileW
LoadLibraryExA
GetLocaleInfoW
DuplicateHandle
SleepEx
lstrlenA
GetSystemWindowsDirectoryA
CallNamedPipeW
HeapAlloc
lstrcatW
FindFirstFileW
GetCommProperties
FormatMessageW
UnhandledExceptionFilter
SetThreadPriority
CreateSemaphoreA
FindResourceExA
ExitThread
HeapCreate
SetEndOfFile
CreateThread
lstrcpyA
GlobalCompact
GlobalAddAtomW
GetACP
OpenEventA
MulDiv
ReadFile
GetModuleHandleA
SetHandleInformation
FindFirstChangeNotificationW
GlobalFree
VirtualAlloc
HeapFree
GetTickCount
IsBadReadPtr
AddAtomA
GetLocalTime
SetCommMask
CompareStringA
SetFileAttributesW
UnmapViewOfFile
ClearCommBreak
GetModuleFileNameA
GetLongPathNameW
InitializeCriticalSection
GlobalDeleteAtom
GetCurrentThreadId
CreateFileW
GetFileInformationByHandle
msvcrt
swprintf
floor
_controlfp
system
wcstoul
isalnum
mbtowc
wcsncpy
memset
mbstowcs
iswprint
srand
rand
iswalpha
ungetc
ftell
__set_app_type
__p__fmode
strpbrk
wcstok
remove
strstr
strcpy
__p__commode
_amsg_exit
tolower
isupper
iswxdigit
_initterm
_ismbblead
strrchr
_XcptFilter
realloc
_exit
_cexit
__setusermatherr
clock
iswctype
toupper
sscanf
__getmainargs
fseek
getenv
wcspbrk
fclose
strerror
wcscat
strcspn
Exports
Exports
?ForceTriangulateA@@YGKDDPAX:O
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reat Size: 512B - Virtual size: 121B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.uac Size: 1KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.riat Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.byte Size: 1024B - Virtual size: 545B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vdata Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 134KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ