T:\oPjfiy\XvpnGqdo\jGqvghf\zsgy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1954fc01012132d306051ca50f3534de_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1954fc01012132d306051ca50f3534de_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1954fc01012132d306051ca50f3534de_JaffaCakes118
-
Size
144KB
-
MD5
1954fc01012132d306051ca50f3534de
-
SHA1
bcb98d7041dae91104c23fd747256d4104377893
-
SHA256
c634283ecff88d13b627df373debd18fce74e54250939f7d2d26ed6274f19a84
-
SHA512
bc61b91e7695aed9e27025f4c3d2051af9f82f0d7654f15b03064c084c229152c8486517b981cf6b63653a681a3b636d27018d16cc48aa3f9ff5bf83ebc8dc85
-
SSDEEP
3072:JTLePdXR2TFQGq7cL79DQuCklRTYkD94wBVFnqbQ:JTmB+FQ8LBsuTRckDxJ0Q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1954fc01012132d306051ca50f3534de_JaffaCakes118
Files
-
1954fc01012132d306051ca50f3534de_JaffaCakes118.exe windows:5 windows x86 arch:x86
ef901d823669fa6f86ef6f341e1ece42
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
Ellipse
GetFontData
GetBitmapBits
SetLayout
RealizePalette
CreateBrushIndirect
GetCurrentObject
CreateDCW
TranslateCharsetInfo
ExtFloodFill
StretchBlt
SaveDC
kernel32
GetWindowsDirectoryA
IsValidLocale
FindFirstFileA
HeapAlloc
CreateWaitableTimerA
OpenFile
IsBadStringPtrW
HeapUnlock
GetSystemTimeAdjustment
GetStartupInfoA
lstrcmpiA
UnhandledExceptionFilter
GetThreadTimes
GetStartupInfoW
user32
RemoveMenu
GetClassInfoExA
BeginPaint
HiliteMenuItem
MapWindowPoints
GetTopWindow
GetWindowLongA
SendMessageTimeoutW
WaitForInputIdle
CharUpperA
CreateMenu
ArrangeIconicWindows
GetForegroundWindow
ChangeMenuW
BeginDeferWindowPos
InsertMenuW
DefFrameProcA
LoadImageA
RegisterClassW
SetSysColors
LoadBitmapW
ValidateRect
ReleaseDC
InSendMessage
GetKeyboardLayout
FillRect
CopyRect
CheckMenuItem
RemovePropW
LoadAcceleratorsW
ole32
CoInitializeEx
CoUninitialize
comctl32
CreateToolbarEx
DestroyPropertySheetPage
ImageList_LoadImageW
ImageList_Destroy
CreatePropertySheetPageW
Exports
Exports
?_NIcojp@@YGIPAHE@Z
?ax_Pwxwd_PNYAHY@@YGXME@Z
?_F_P_HBX_o_gzimweL_B@@YGPAKPAK@Z
?XJZVyqbzX_p@@YGEFPAI@Z
?MZ_TKQ_YM@@YGEJ_N@Z
?Cdnxei_DBKY_J@@YGFPAIPAG@Z
?_ZVCXbkgrpwplohvx_@@YGHPAN@Z
?_Z_LyqMI_@@YGFPAK@Z
?lfhjgaafy_PU_@@YGXPAEPAE@Z
?HI__PUDCD_qk_hxIWZTMT_@@YGXPAD_N@Z
?_BM_Xbizis@@YGH_NPAG@Z
?moqwjhh___x_xp_JBjPLCK@@YGPAIPAMK@Z
?ylrgVDOKRUVSG@@YG_NPAH@Z
?FZeAXH__BgNGXIPgkn@@YGKIPAI@Z
?CsagZcKgzzqqDVU@@YGPAIFH@Z
?MQ_KV_mkG__E_@@YGPANE@Z
?kedl_o_z@@YGPAXM@Z
?ro_yo__l__AGlfv_x_@@YGPAXPAG_N@Z
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ