Q:\inukqgxEh\vuoWnoDoOxZts\QsNcEmsnqiq\BOOwozmdogiJ\uNuhRvoEzohby.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0fb6c940159b61ac6ad7ed1d4ae0ce91_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0fb6c940159b61ac6ad7ed1d4ae0ce91_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0fb6c940159b61ac6ad7ed1d4ae0ce91_JaffaCakes118
-
Size
216KB
-
MD5
0fb6c940159b61ac6ad7ed1d4ae0ce91
-
SHA1
11b9ba2fd9c521cac0fb45a26d30fbe87ef4eabb
-
SHA256
fd42a517cc6ad97d93d3a0ca7a4a1c8165e8a6e1b7179276450c935728bd116f
-
SHA512
76a3180b80edcba2b823c20021cec6be1d039aafc85bba9373e48c353093f6eb05a85b05e602535b6b4e9a00e734977bb82d796a5bc05b94fe1269099277c366
-
SSDEEP
6144:HHkkuhkBVavINGAAK6fsIsR+tLtQWLWiYfB/QoKOaB:HECbMq6fsIp3QWL2ahOa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0fb6c940159b61ac6ad7ed1d4ae0ce91_JaffaCakes118
Files
-
0fb6c940159b61ac6ad7ed1d4ae0ce91_JaffaCakes118.exe windows:5 windows x86 arch:x86
8b9b894d19e76ab7884fb83d53806062
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
SetROP2
GetViewportOrgEx
AbortDoc
GetTextExtentPoint32A
ResizePalette
DPtoLP
OffsetViewportOrgEx
AddFontResourceW
TextOutA
CreateFontIndirectA
GetCurrentObject
GetObjectW
GetTextMetricsW
GetWindowOrgEx
CreateCompatibleBitmap
GetCharWidth32W
user32
ShowWindow
GetWindow
TranslateAcceleratorW
SetActiveWindow
CopyRect
GetActiveWindow
DrawFocusRect
OpenIcon
SetWindowLongA
GetDlgItem
DestroyWindow
GetWindowPlacement
AdjustWindowRectEx
KillTimer
wvsprintfA
SetDlgItemInt
PostMessageW
IsMenu
FindWindowExW
MoveWindow
GetNextDlgTabItem
FindWindowA
TranslateMessage
EndPaint
InflateRect
GetScrollRange
GrayStringW
CreateCaret
GetParent
ScreenToClient
GetScrollInfo
AppendMenuW
DestroyCaret
GetForegroundWindow
SetCursor
IsCharUpperA
CallWindowProcA
DrawIcon
msvcrt
iswctype
fgetc
_controlfp
__set_app_type
tolower
sscanf
__p__fmode
__p__commode
_amsg_exit
_initterm
_acmdln
setlocale
exit
_ismbblead
fgets
_XcptFilter
isspace
_exit
_cexit
fputs
towupper
strcspn
__setusermatherr
__getmainargs
kernel32
GetLocalTime
lstrlenA
GetFileAttributesExA
ConvertDefaultLocale
GetNumberFormatA
FlushFileBuffers
LoadResource
GetSystemDirectoryW
QueryDosDeviceW
FindFirstFileW
GetModuleHandleW
CallNamedPipeW
GlobalAddAtomW
SetFileAttributesA
SleepEx
GetTimeFormatA
lstrcatA
lstrcatW
IsBadStringPtrA
comdlg32
CommDlgExtendedError
PageSetupDlgW
Exports
Exports
?LeaveCriticalSectionGDhkyjkjhHFJlF@@YGKEPA_WG@Z
Sections
.text Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.diag_x Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.diag_y Size: 512B - Virtual size: 94B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.div Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idat Size: 512B - Virtual size: 416B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.imul Size: 512B - Virtual size: 307B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.plus Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.minus Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ