e:\eanynhozz.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0df8f62ff7a4cdd579099989678ce6e2_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0df8f62ff7a4cdd579099989678ce6e2_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0df8f62ff7a4cdd579099989678ce6e2_JaffaCakes118
-
Size
596KB
-
MD5
0df8f62ff7a4cdd579099989678ce6e2
-
SHA1
99228ce02c2094624ef48287cf24e80a1f3f84f7
-
SHA256
aa7d7d770a121bac65c82262980351c76f9b03a22b713b119ae92c46649776dd
-
SHA512
def8e5de5b3cabe788a2babb0a95ce147e8f6550d27cb079922175761b7f685bd0fc6a29f1de41a7acb4102123e75a194057da0499a59417d9655a68602aabf3
-
SSDEEP
12288:oH1ErCGmqh2sLXSq4Ys0epNkan05Y1ObDrqx:81ErCGJYcpA1P+rq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0df8f62ff7a4cdd579099989678ce6e2_JaffaCakes118
Files
-
0df8f62ff7a4cdd579099989678ce6e2_JaffaCakes118.exe windows:4 windows x86 arch:x86
c190f1ef2d6c6d264f2c32794d6150cc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetEnvironmentVariableA
LocalLock
QueryPerformanceCounter
OpenFile
CreateEventW
GetDateFormatA
SetConsoleCtrlHandler
GetWindowsDirectoryA
IsValidCodePage
GetLocaleInfoA
GetProcAddress
GetLastError
MultiByteToWideChar
HeapFree
RtlUnwind
GetProfileIntA
SetFilePointer
DeleteCriticalSection
TerminateProcess
ResumeThread
WriteConsoleOutputW
UnhandledExceptionFilter
EnterCriticalSection
FreeEnvironmentStringsW
ReadConsoleOutputCharacterW
Sleep
GetModuleFileNameW
ExitProcess
EnumSystemLocalesA
WriteProfileStringA
GetACP
TryEnterCriticalSection
VirtualAlloc
OpenMutexA
GetLongPathNameA
InterlockedExchange
GetStringTypeW
GetDiskFreeSpaceExW
FileTimeToDosDateTime
GetPrivateProfileSectionW
GetCurrencyFormatA
GetFileTime
SetHandleCount
FindResourceA
TlsSetValue
SetThreadAffinityMask
IsValidLocale
GetEnvironmentStringsW
IsDebuggerPresent
GetModuleHandleA
SetUnhandledExceptionFilter
LocalFileTimeToFileTime
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
GetTickCount
GetUserDefaultLCID
GetTimeFormatA
GetLogicalDriveStringsA
GetConsoleOutputCP
FreeLibrary
GetModuleFileNameA
GetStdHandle
WriteConsoleOutputA
LockFileEx
CreateMutexA
GetCommandLineA
WriteConsoleW
GetCalendarInfoW
LeaveCriticalSection
ReadFile
SetStdHandle
CompareStringW
GetModuleHandleW
TlsGetValue
WideCharToMultiByte
GetCPInfo
FindResourceExW
GetCurrentThread
HeapDestroy
HeapSize
GetCurrentDirectoryA
GetCurrentProcessId
CloseHandle
WriteFile
VirtualUnlock
WritePrivateProfileStringW
InterlockedIncrement
GlobalFree
GetProfileSectionA
VirtualQuery
GetStringTypeA
OpenMutexW
GetFileType
TlsFree
HeapReAlloc
SetConsoleCursorInfo
WriteConsoleA
TlsAlloc
CompareStringA
WaitForDebugEvent
RemoveDirectoryA
GetStartupInfoA
GetConsoleMode
LoadLibraryA
GetCurrentProcess
GetPrivateProfileIntW
CreateFileA
HeapAlloc
GetOEMCP
SetLastError
FlushFileBuffers
GetConsoleCP
GlobalFlags
LCMapStringW
EnumResourceTypesW
VirtualFree
GetStartupInfoW
LCMapStringA
InterlockedDecrement
RemoveDirectoryW
GetTimeZoneInformation
GetCommandLineW
HeapCreate
GetSystemTimeAsFileTime
user32
DestroyWindow
DefWindowProcW
MessageBoxW
RegisterClassA
DrawAnimatedRects
LoadAcceleratorsW
EnumDisplayDevicesA
OpenClipboard
RegisterClassExA
MessageBoxExW
CreateWindowExA
CallWindowProcA
GetDialogBaseUnits
GetMenuItemInfoA
GetKeyboardLayoutNameW
GetClientRect
CreateIconFromResource
ShowWindow
OemKeyScan
SetScrollPos
GetCaretPos
DdeKeepStringHandle
EqualRect
SetProcessWindowStation
GetDCEx
GetFocus
DefWindowProcA
comctl32
InitCommonControlsEx
ImageList_DragMove
Sections
.text Size: 208KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 248KB - Virtual size: 245KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ