C:\gvJaadJmmrwh\xNzunaarzaBflg\fEwzAfqpim.pdb
Static task
static1
Behavioral task
behavioral1
Sample
183b4be05d0d050fbc09ab9aeb590a21_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
183b4be05d0d050fbc09ab9aeb590a21_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
183b4be05d0d050fbc09ab9aeb590a21_JaffaCakes118
-
Size
163KB
-
MD5
183b4be05d0d050fbc09ab9aeb590a21
-
SHA1
cdea64bdce658b76d9438f369fb88fe084a2f2c2
-
SHA256
f323ccf4f7436f4f54d016e3651dec01b77aebfde67cd2594c482e453b201a0c
-
SHA512
d2105a11162d16c2dff56dd88cf8fabef8063bfe97de932145ea27414f831324a5e5db49ce994335dd43fb9567d8f19370dc3b4fd44157753ac672f581fb4c0b
-
SSDEEP
3072:BWIj8ubcmHZl4rn5Xuc5F3D+ls3yLDT+pLj6rYpRdZAU:gub5Xkr/KlayLDSVjTP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 183b4be05d0d050fbc09ab9aeb590a21_JaffaCakes118
Files
-
183b4be05d0d050fbc09ab9aeb590a21_JaffaCakes118.exe windows:5 windows x86 arch:x86
dda68af89a5b58d7044ce6ca235b6d9e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
GetViewportOrgEx
BeginPath
GetNearestPaletteIndex
CreateRectRgn
Rectangle
CreateRectRgnIndirect
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_amsg_exit
_initterm
_ismbblead
_XcptFilter
_exit
realloc
memset
_cexit
atoi
__setusermatherr
srand
__getmainargs
kernel32
LoadLibraryA
GetModuleFileNameA
FindFirstFileW
lstrcmpiW
lstrcpynA
OpenSemaphoreW
HeapFree
LocalLock
lstrlenA
OpenFileMappingW
LoadLibraryExA
user32
SendDlgItemMessageW
TrackPopupMenuEx
GetMessageA
DestroyCursor
IsWindowEnabled
wsprintfW
GetDC
FindWindowA
shlwapi
UrlGetLocationW
ChrCmpIW
Exports
Exports
?CreateDlgMessage@@YGHPAXPADK|U
Sections
.text Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idir Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 136KB - Virtual size: 394KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE