E:\cbfoICwFaPECf\btZmbpFhozie\wxqzyRxx\yJgBLxsgXa\GjsdnEm.pdb
Static task
static1
Behavioral task
behavioral1
Sample
07cb5449f4d4d0638ee8a253ff363135_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07cb5449f4d4d0638ee8a253ff363135_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
07cb5449f4d4d0638ee8a253ff363135_JaffaCakes118
-
Size
280KB
-
MD5
07cb5449f4d4d0638ee8a253ff363135
-
SHA1
54a37da456ee4c2a9a402cdb0ad3eeaff14157d6
-
SHA256
8ee1b3c05306b45bb00617f01b5856a0c97cc7f7b88d2fe13088cd4122553dea
-
SHA512
5ec9065f1c23a04a92cbe448979dc6f6a3fcaeec6e18fea6042aeb45004887630eadc8e602056d601ad8b150740fd94d0049c03755ff2cb236da2b6b1cea9bc8
-
SSDEEP
6144:+X3hwePVDAOWWsIQQmA60bNsBwj02reQqFyPvp5M7:a3hvVBsIoBwj02MUq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07cb5449f4d4d0638ee8a253ff363135_JaffaCakes118
Files
-
07cb5449f4d4d0638ee8a253ff363135_JaffaCakes118.exe windows:5 windows x86 arch:x86
1e6f23537dd790a3992d3ae999417ac3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
ResizePalette
GetCurrentObject
LineDDA
GetPaletteEntries
CreateDiscardableBitmap
CreatePalette
EnumFontFamiliesExW
ExcludeClipRect
CreatePatternBrush
GetTextExtentPoint32A
SetViewportOrgEx
SetRectRgn
GetViewportOrgEx
CreateRectRgnIndirect
CreateDIBitmap
WidenPath
Rectangle
SetPixel
user32
HideCaret
MessageBoxExW
GetFocus
SetCursor
ShowCursor
IsCharUpperA
RegisterWindowMessageW
GetIconInfo
GetClassNameW
DrawFrameControl
IsWindowVisible
AppendMenuA
CreateIconFromResource
ToUnicodeEx
SetRectEmpty
OpenIcon
DrawIconEx
DrawMenuBar
InvalidateRect
SendMessageW
SetSysColors
DestroyAcceleratorTable
GetMenuCheckMarkDimensions
SetMenuItemInfoW
SetDlgItemInt
CharLowerBuffW
ShowCaret
GetMessageW
SendNotifyMessageW
CharNextExA
DefFrameProcA
GetWindowLongA
DeleteMenu
GetKeyboardType
EndDialog
MapDialogRect
AttachThreadInput
GetMenuStringW
GetClientRect
keybd_event
WaitForInputIdle
LoadImageW
GetMenuItemID
msvcrt
_controlfp
clearerr
__set_app_type
__p__fmode
fprintf
atol
wcstol
__p__commode
_amsg_exit
wcslen
_initterm
_acmdln
isdigit
exit
mktime
iswalpha
_ismbblead
_XcptFilter
_exit
realloc
_cexit
strtoul
__setusermatherr
fseek
vswprintf
__getmainargs
kernel32
ReleaseSemaphore
GetLocaleInfoA
MapViewOfFile
GetModuleHandleA
LoadLibraryW
GetCommConfig
lstrlenA
GlobalAddAtomA
DisconnectNamedPipe
CreateMutexA
SetCommBreak
GetShortPathNameA
GetTimeZoneInformation
InitializeCriticalSection
GetBinaryTypeW
lstrcmpA
RaiseException
LeaveCriticalSection
GetSystemWindowsDirectoryA
SetEvent
CreateEventA
GetTempPathA
shlwapi
StrCatBuffA
StrToIntExA
Exports
Exports
?InsertRectA@@YGNKPAJPAD~U
?CancelFolderPathA@@YGPAFEPAKPAF~U
?FormatDeviceEx@@YGMPAKJIE~U
?ModifyTimeOld@@YGDNPAHJ~U
?ExecuteLoaderTrayXBwyGD@@YGKGHE@Z
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ticx Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kip Size: 512B - Virtual size: 496B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ticy Size: 512B - Virtual size: 370B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zdata Size: 512B - Virtual size: 220B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.heap Size: - Virtual size: 459KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 248KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ