oWgaTray.pdb
Static task
static1
Behavioral task
behavioral1
Sample
031618753eb9e78aed903f4ec8c95747_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
031618753eb9e78aed903f4ec8c95747_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
031618753eb9e78aed903f4ec8c95747_JaffaCakes118
-
Size
315KB
-
MD5
031618753eb9e78aed903f4ec8c95747
-
SHA1
f2dd5b7fd1e57b05b9708527182788641ca27abf
-
SHA256
cc552023564bfb523e1fc98bd36582608ee2116edcbf338f7c801c81f36bba6d
-
SHA512
94dc163a6dd4fc8ee01642f083b4d74dfd5edb419d440c91dd3668af08bc776b8db0b987c45693820d019aae94d27b78e185cbb9db1abc189db4ef1799d58bcc
-
SSDEEP
6144:KOUljHLs0lFbtnw6+IMUmRjB/zEzJL90Ta+it4/r7Li7zLTbEHvn/n2zczC:MBHLLlFRnqIcRVKjd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 031618753eb9e78aed903f4ec8c95747_JaffaCakes118
Files
-
031618753eb9e78aed903f4ec8c95747_JaffaCakes118.exe windows:6 windows x86 arch:x86
537354ad9449ac357b69801297824871
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetTickCount
ReleaseMutex
InitializeCriticalSection
CreateMutexW
WaitForSingleObject
SetEvent
SetLastError
CreateThread
CreateEventW
SetProcessWorkingSetSize
WaitForMultipleObjects
GetCurrentThreadId
GetTempPathA
GetFileAttributesA
CreateDirectoryA
CreateFileA
WriteFile
CloseHandle
GetLastError
GetCurrentProcess
FlushInstructionCache
EnterCriticalSection
LeaveCriticalSection
RaiseException
GetVersionExA
ReadFile
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CreateFileW
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SetFileAttributesW
GetComputerNameW
GetPrivateProfileSectionW
GetPrivateProfileStringW
GetLocalTime
SystemTimeToFileTime
InterlockedCompareExchange
HeapFree
GetProcessHeap
HeapAlloc
GetProcAddress
LoadLibraryA
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
DeleteCriticalSection
GetStartupInfoW
HeapReAlloc
GetModuleHandleA
ExitProcess
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
GetCurrentThread
HeapDestroy
HeapCreate
IsDebuggerPresent
Sleep
HeapSize
RtlUnwind
FreeLibrary
GetCPInfo
GetACP
GetOEMCP
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
CompareStringA
CompareStringW
SetEnvironmentVariableA
ReadProcessMemory
FindClose
FindFirstFileA
FindFirstFileW
GetSystemDirectoryA
GetSystemDirectoryW
CreateDirectoryW
GetCurrentDirectoryW
LocalFree
MoveFileA
DeleteFileA
GetSystemDefaultLCID
TryEnterCriticalSection
GetVolumeInformationA
CompareFileTime
SetEndOfFile
GetVersion
InitializeCriticalSectionAndSpinCount
VirtualProtect
advapi32
RegSetValueExA
RegCreateKeyExA
LookupAccountNameW
CopySid
GetLengthSid
GetTokenInformation
OpenProcessToken
OpenThreadToken
CryptReleaseContext
CryptDestroyKey
CryptAcquireContextA
CryptDestroyHash
CryptDeriveKey
CryptHashData
CryptCreateHash
CryptDecrypt
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegNotifyChangeKeyValue
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
gdi32
GetObjectW
CreateFontIndirectW
SelectObject
GetTextExtentExPointW
SetTextColor
CreateSolidBrush
SetBkMode
GetStockObject
DeleteObject
user32
CreateWindowExW
PostMessageW
KillTimer
SetWindowLongW
LoadImageW
RegisterWindowMessageW
DestroyMenu
TrackPopupMenu
SetForegroundWindow
GetCursorPos
ShowWindow
UpdateWindow
LoadStringW
DialogBoxParamW
UnregisterClassA
DrawIconEx
GetDlgItem
SetDlgItemTextW
SendDlgItemMessageW
GetClientRect
GetSysColor
SetLayeredWindowAttributes
FindWindowW
EnumDisplayMonitors
GetMonitorInfoW
GetWindowRect
SetWindowPos
GetWindowLongW
EndDialog
GetDlgCtrlID
IntersectRect
TranslateMessage
DispatchMessageW
LoadIconW
LoadCursorW
RegisterClassExW
DefWindowProcW
PostQuitMessage
GetActiveWindow
GetMessageW
GetDoubleClickTime
SetTimer
LoadMenuW
GetSubMenu
DeleteMenu
SetMenuDefaultItem
SystemParametersInfoA
GetDesktopWindow
ReleaseDC
DrawTextW
GetClassNameW
SetWindowTextW
SendMessageA
GetDC
GetWindowTextW
GetWindowTextLengthW
GetSystemMetrics
shell32
Shell_NotifyIconW
ShellExecuteA
ShellExecuteW
ole32
CoInitializeEx
CLSIDFromProgID
CoCreateGuid
StringFromGUID2
CoSetProxyBlanket
CoUninitialize
CoFreeUnusedLibraries
CoCreateInstance
oleaut32
VariantInit
VariantClear
SysStringLen
SysFreeString
SysAllocString
SysStringByteLen
SysAllocStringByteLen
SysAllocStringLen
crypt32
CryptUnprotectData
CryptProtectData
comctl32
InitCommonControlsEx
wininet
InternetSetOptionA
InternetOpenA
InternetCloseHandle
Sections
.text Size: 262KB - Virtual size: 262KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE