e:\wingx\src\autorun\Release\autorun.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0d94778360233f4103b903a7d7f3f1b8_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0d94778360233f4103b903a7d7f3f1b8_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
0d94778360233f4103b903a7d7f3f1b8_JaffaCakes118
-
Size
976KB
-
MD5
0d94778360233f4103b903a7d7f3f1b8
-
SHA1
4fd6f2d0cf498a8987d20214d1dc9258d95508b5
-
SHA256
1d491d7d9dd348d1d7b4ad33872544b35b05133bd4c2048341bef1f5aac8f469
-
SHA512
9587759278d5df80aff92cabb1cf1f7806a17aa14a35238a1a6b0dabd0e5871480b35ce53575c4534f1b68b93b60f258d67b605b61daca74ca02e51766b3cdcc
-
SSDEEP
24576:vWKOteFkp4vX8PVGdSdIy7gZGk9RMIwRfV0E1:vJOdmUPkEIcg7MfRf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d94778360233f4103b903a7d7f3f1b8_JaffaCakes118
Files
-
0d94778360233f4103b903a7d7f3f1b8_JaffaCakes118.exe windows:4 windows x86 arch:x86
01230bc93093e920365cb671eff945b4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LCMapStringA
GetSystemInfo
VirtualProtect
GetLocaleInfoA
VirtualAlloc
VirtualQuery
InterlockedExchange
RtlUnwind
LoadLibraryA
GetCPInfo
GetOEMCP
GetACP
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
VirtualFree
HeapCreate
Sleep
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
WriteFile
HeapFree
HeapSize
GetCurrentProcess
TerminateProcess
GetProcAddress
HeapReAlloc
HeapAlloc
GetModuleFileNameA
FindResourceA
LoadResource
LockResource
FreeResource
GlobalAlloc
lstrcatA
GlobalLock
GlobalUnlock
GlobalFree
GetCurrentDirectoryA
GetVersionExA
lstrlenA
lstrcmpA
SetCurrentDirectoryA
LocalAlloc
LocalLock
LocalUnlock
LocalFree
GetFileAttributesA
GetLastError
lstrcpyA
HeapDestroy
GetSystemTimeAsFileTime
GetCurrentProcessId
ExitProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
LCMapStringW
user32
SendMessageA
CopyRect
FillRect
DrawTextA
InvalidateRect
CreateAcceleratorTableA
SetWindowTextA
CharNextA
CharLowerA
FindWindowA
MessageBoxA
GetSystemMetrics
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateAcceleratorA
DispatchMessageA
DestroyAcceleratorTable
UnregisterClassA
LoadIconA
LoadCursorA
GetSysColorBrush
RegisterClassA
DestroyWindow
BeginPaint
GetDC
ReleaseDC
EndPaint
PostQuitMessage
DefWindowProcA
GetUpdateRect
RedrawWindow
PostMessageA
LoadStringA
TranslateMessage
gdi32
GetStockObject
GetTextExtentPointA
SetTextColor
SetBkMode
CreateDIBitmap
GetSystemPaletteEntries
CreatePalette
GetDeviceCaps
CreateFontA
GetObjectA
CreateCompatibleDC
RealizePalette
SelectObject
BitBlt
DeleteObject
DeleteDC
SelectPalette
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteExA
Sections
.text Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 936KB - Virtual size: 935KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nrdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE