e:\wuowsow\tjqfsywsbk\tvselaa.pdb
Static task
static1
Behavioral task
behavioral1
Sample
16b70ffaeecddcda60b03ed0e21949e5_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
16b70ffaeecddcda60b03ed0e21949e5_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
16b70ffaeecddcda60b03ed0e21949e5_JaffaCakes118
-
Size
548KB
-
MD5
16b70ffaeecddcda60b03ed0e21949e5
-
SHA1
2f62ed9231f64caee6da2dd85b91d7b3bbe14813
-
SHA256
0c763756e9d08c75d596a1aaf69aa01685450133618925d85ecab161eb0b2c8b
-
SHA512
b88c2f2f0d6238d5a09b76aa3749c43f1f4dec322b8cab2df3c3e9c1d9159b07ba7ff254db89987e2e0c366befd64bad222d8dd48bfbc5109216cb7bd2da479b
-
SSDEEP
12288:V4vTAH9u04MLRgN+lD9q2+wlIYSyNwV1TxQ8xaw5mV:+vTAHY04MLRgNqD9qw4yuT26aOg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 16b70ffaeecddcda60b03ed0e21949e5_JaffaCakes118
Files
-
16b70ffaeecddcda60b03ed0e21949e5_JaffaCakes118.exe windows:4 windows x86 arch:x86
97a16fb54714748ebb669e20b40194a6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_Read
_TrackMouseEvent
ImageList_GetImageRect
ImageList_AddIcon
ImageList_Write
InitCommonControlsEx
CreateToolbarEx
CreateStatusWindowA
ImageList_LoadImage
ImageList_SetDragCursorImage
DestroyPropertySheetPage
ImageList_SetFlags
kernel32
GetTimeFormatA
GetModuleHandleA
ReadFile
HeapCreate
HeapFree
SetFilePointer
VirtualProtect
UnhandledExceptionFilter
CreateFileA
LCMapStringA
CloseHandle
CompareStringA
GetCommandLineA
GetVersionExA
VirtualAlloc
QueryPerformanceCounter
HeapAlloc
GetLastError
LeaveCriticalSection
CreateEventW
OpenMutexA
GetProcAddress
CreateMutexA
CompareStringW
LoadLibraryA
TlsGetValue
MultiByteToWideChar
TlsFree
SetHandleCount
GetUserDefaultLCID
GetStringTypeA
GetOEMCP
SetEnvironmentVariableA
GetStdHandle
EnumSystemLocalesA
HeapSize
IsBadWritePtr
FlushFileBuffers
GetCurrencyFormatW
WideCharToMultiByte
GetLocaleInfoW
VirtualQuery
WriteFile
EnterCriticalSection
GetCurrentThreadId
LoadLibraryExA
VirtualProtectEx
IsValidLocale
GetEnvironmentStrings
lstrlenA
SetLastError
FreeEnvironmentStringsW
LockFileEx
TlsAlloc
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentThread
TerminateProcess
GetTimeZoneInformation
GetSystemInfo
MoveFileExW
DeleteCriticalSection
GetStartupInfoA
GetCurrentProcessId
GetCurrentProcess
SetConsoleTitleA
FindClose
IsValidCodePage
GetACP
GetFileType
HeapReAlloc
ExitProcess
GetEnvironmentStringsW
HeapDestroy
InterlockedExchange
GetLocaleInfoA
LCMapStringW
InitializeCriticalSection
VirtualFree
lstrcmpA
CreatePipe
GetStringTypeW
GetPrivateProfileIntA
GetConsoleTitleW
GetDateFormatA
OpenSemaphoreW
FreeEnvironmentStringsA
SetConsoleTextAttribute
TlsSetValue
GetModuleFileNameA
SetStdHandle
GetTickCount
GetCPInfo
user32
AnimateWindow
DrawCaption
SetWindowTextA
SystemParametersInfoA
RegisterClassExA
GetDesktopWindow
UnregisterDeviceNotification
DrawTextExA
ChangeClipboardChain
LookupIconIdFromDirectory
RegisterDeviceNotificationW
DefWindowProcW
WINNLSGetIMEHotkey
GetDoubleClickTime
GetWindowTextA
DestroyWindow
CharUpperBuffW
CharNextW
CreateWindowExW
GetMenuStringA
ShowWindow
DeleteMenu
WaitMessage
IsCharAlphaNumericW
EnumClipboardFormats
GetWindowThreadProcessId
EnumPropsExW
EnumWindowStationsW
EnumDisplayMonitors
SendIMEMessageExW
LoadCursorFromFileA
SetSysColors
DrawStateW
FlashWindowEx
RegisterClassA
DestroyCaret
ValidateRgn
DrawTextW
CallMsgFilterA
CheckDlgButton
InSendMessageEx
MessageBoxW
GetClassLongW
CreateWindowExA
IsClipboardFormatAvailable
CharToOemW
DefDlgProcA
ShowCursor
CreateIcon
SendMessageTimeoutW
EnumDisplaySettingsExA
Sections
.text Size: 152KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 264KB - Virtual size: 262KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ