Q:\qrzKiuHn\KOHAudyfv\dLoPtjVgvpRh\wmAzzttovrewSx\pAzNExxWi.pdb
Static task
static1
Behavioral task
behavioral1
Sample
10235c4980a756bc3d3fcda65baf7e1f_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
10235c4980a756bc3d3fcda65baf7e1f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
10235c4980a756bc3d3fcda65baf7e1f_JaffaCakes118
-
Size
216KB
-
MD5
10235c4980a756bc3d3fcda65baf7e1f
-
SHA1
80ea86bfd5015cdc08928bc893c0d6334791769a
-
SHA256
8ea5cdb68ff5da71f08bf94ea41bdad7993b8584fd66288cb2ce132537cfdc4b
-
SHA512
9cbbe3200e3dcf84b948fd569155218d39e4b81425c54257f08b6099efdbc2bf43008b721144730ce26ef90cf7e0a22b587a0d20c3fd0f4012f9be825fed33c7
-
SSDEEP
6144:5sbiB2RAkKFa5Yy6yxr748nErBH7T2CTvlF:5lEWa5Yyn0H7T2Il
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10235c4980a756bc3d3fcda65baf7e1f_JaffaCakes118
Files
-
10235c4980a756bc3d3fcda65baf7e1f_JaffaCakes118.exe windows:5 windows x86 arch:x86
780a1ce6277a16e3aa592a06c6e80c6a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
ord196
ord195
msvcrt
isxdigit
_controlfp
__set_app_type
strchr
__p__fmode
__p__commode
remove
strspn
_amsg_exit
vsprintf
_initterm
toupper
_acmdln
isupper
islower
exit
_ismbblead
_XcptFilter
_exit
_cexit
__setusermatherr
wcstombs
ftell
__getmainargs
gdi32
GetBitmapBits
CreateDiscardableBitmap
SetStretchBltMode
Polygon
OffsetViewportOrgEx
SetMapMode
StretchBlt
StretchDIBits
PatBlt
CreateRectRgnIndirect
CreateFontIndirectW
GetTextExtentPoint32A
ExtTextOutA
SetTextColor
LineDDA
comctl32
CreateToolbarEx
PropertySheetA
CreatePropertySheetPageA
user32
GetSysColorBrush
BringWindowToTop
GetMenuItemInfoW
CopyImage
IsDialogMessageW
IntersectRect
CreateMenu
IsZoomed
MonitorFromRect
DialogBoxIndirectParamW
GetFocus
SetCursorPos
SetDlgItemTextA
RegisterWindowMessageA
EndPaint
LoadAcceleratorsA
LoadIconA
SetTimer
InvalidateRect
GetClassInfoExW
GetClassLongW
DeleteMenu
CharUpperBuffA
ValidateRect
SendMessageTimeoutW
WaitForInputIdle
GetClassNameW
CopyRect
CharUpperW
DispatchMessageW
GetMenuCheckMarkDimensions
GetUpdateRect
ScrollWindowEx
GetActiveWindow
kernel32
LoadLibraryA
FindResourceA
LockFile
FindFirstChangeNotificationW
OpenFileMappingA
lstrcmpW
AreFileApisANSI
SetCurrentDirectoryW
GetFileAttributesExA
SetPriorityClass
GlobalCompact
GlobalFree
FindNextFileA
CreateNamedPipeA
VirtualQuery
CompareStringA
Exports
Exports
?EnterCriticalSectionJHhjhgGJj@@YGKEPA_WG@Z
Sections
.text Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 512B - Virtual size: 400B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tcode Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data1 Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data2 Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data3 Size: 512B - Virtual size: 257B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ