I:\FNwyHyzFdj\DzwfdKzfpLpk\rAxoxcplVicBL\BEvSAEgEzDWtyL\ozvaqUmbaqSo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0ddaa455b1bb4b9e1c7173dd6a22585e_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0ddaa455b1bb4b9e1c7173dd6a22585e_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
0ddaa455b1bb4b9e1c7173dd6a22585e_JaffaCakes118
-
Size
221KB
-
MD5
0ddaa455b1bb4b9e1c7173dd6a22585e
-
SHA1
0e615ecbccadd290b638d4db5817d8f63a107823
-
SHA256
d8ddd18a68cbb58bfd0be0662b89fd0acbb10b6ce71833515a1d94e68fecbb4d
-
SHA512
0345d44f155ddb16e700d9604072e9f5e65cd477be58524c04e07e0a9685fce588677674ce585580d93c36305f7e1b29a3ce5f82daf0b7a5221413c56d4e02f5
-
SSDEEP
6144:PrwytNk+P91xG1eoCW87ApxFP5t3oxZzO:zwyj/W8Mh6JO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ddaa455b1bb4b9e1c7173dd6a22585e_JaffaCakes118
Files
-
0ddaa455b1bb4b9e1c7173dd6a22585e_JaffaCakes118.exe windows:5 windows x86 arch:x86
6cb945d337639b7bc58f29c3e77ad6a2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
memcpy
ole32
OleIsRunning
comdlg32
GetOpenFileNameA
PrintDlgExW
ReplaceTextW
version
VerQueryValueW
kernel32
DeleteFileA
LoadLibraryExW
GetFileInformationByHandle
SetLastError
GetCurrentDirectoryW
TransactNamedPipe
VirtualAlloc
LockResource
SetHandleCount
GetComputerNameExW
GetThreadLocale
SearchPathA
EnumResourceNamesW
GetVersion
MoveFileExW
UnhandledExceptionFilter
VerSetConditionMask
gdi32
RoundRect
GetTextAlign
GetPaletteEntries
DPtoLP
CreateRectRgnIndirect
BitBlt
SetDIBitsToDevice
CreatePenIndirect
GetTextColor
GetStockObject
PatBlt
PtInRegion
CreateDCW
GetTextFaceW
SetAbortProc
CreateCompatibleDC
user32
LoadAcceleratorsW
InsertMenuW
GetScrollInfo
GetSubMenu
SendMessageTimeoutW
wvsprintfA
EndDialog
PeekMessageA
GetMenuState
ScreenToClient
GetAltTabInfoW
SetScrollInfo
InsertMenuA
GetKeyState
LoadMenuW
GetKeyNameTextW
PostMessageA
DefDlgProcW
MapDialogRect
SendMessageTimeoutA
wvsprintfW
CreateDialogParamA
GetClassLongA
GetDialogBaseUnits
InsertMenuItemW
EnumChildWindows
DrawStateW
GetClassInfoW
RedrawWindow
SendDlgItemMessageW
ModifyMenuW
TrackPopupMenuEx
GetUserObjectInformationW
GetScrollPos
DispatchMessageA
LookupIconIdFromDirectory
Exports
Exports
?SDOisioKJS@@YGKEPA_WG@Z
Sections
.text Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dat_0 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_1 Size: 512B - Virtual size: 283B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dat_2 Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_3 Size: 1024B - Virtual size: 553B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_4 Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 328B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.debug Size: 512B - Virtual size: 125B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ