W:\cwPtoPnh\kigfZbCedcurd\hAfIlfsiynuc\mmTxHwYstpQ.pdb
Static task
static1
Behavioral task
behavioral1
Sample
19f261ce2354d906c26623ab68bc6edf_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
19f261ce2354d906c26623ab68bc6edf_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
19f261ce2354d906c26623ab68bc6edf_JaffaCakes118
-
Size
203KB
-
MD5
19f261ce2354d906c26623ab68bc6edf
-
SHA1
5145572345a43ac55c55539b3230d3b58f221845
-
SHA256
b56964afe11e9b1c06779b9da50971aefe9d0859d614b115fd6a65d472c578e6
-
SHA512
6da1bc82cbdcf021b8bdba618aa9a9abb5d34f66eae0168f9dfefccc50d88bef52bfb7a349c8594a12541480d73b4352e99dcc01de0f40ba0fe2f82abd269d29
-
SSDEEP
3072:b/NZVYUUgKhIkasPFoZGlHd5i2RMwzxPUAhiyY1gvdUkFSJyNBdE0TrR421:b/Mg+7a4HO2mw9kd+nAKZTl42
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19f261ce2354d906c26623ab68bc6edf_JaffaCakes118
Files
-
19f261ce2354d906c26623ab68bc6edf_JaffaCakes118.exe windows:5 windows x86 arch:x86
9ad883b86d4688e4db0e544769380f36
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
StrToIntW
msvcrt
_controlfp
floor
putc
setvbuf
time
__set_app_type
malloc
gmtime
__p__fmode
isupper
wcsncpy
tolower
mbstowcs
wcstod
iswalpha
isxdigit
strtoul
perror
__p__commode
_amsg_exit
rand
_initterm
_ismbblead
_XcptFilter
memset
_exit
sscanf
realloc
ungetc
_cexit
wcspbrk
wcslen
fseek
swprintf
wcscpy
clock
wcsncmp
system
vsprintf
isprint
isdigit
__setusermatherr
wcstoul
wcsstr
bsearch
islower
__getmainargs
strpbrk
user32
SetRect
SendMessageA
TranslateAcceleratorW
CharPrevA
RegisterClassExW
RegisterHotKey
ShowWindow
PostMessageW
CreateWindowExA
GetDCEx
DefDlgProcA
MapVirtualKeyW
DestroyWindow
DeferWindowPos
CreateMenu
ChildWindowFromPoint
SetCaretPos
ScrollWindowEx
IsWindowUnicode
GetNextDlgTabItem
BeginDeferWindowPos
DrawStateW
MessageBoxA
RegisterClassW
CharUpperBuffA
SystemParametersInfoW
CharLowerA
DrawTextA
SetPropW
GetLastActivePopup
GetClipCursor
FillRect
GetSysColor
SendInput
GetForegroundWindow
wvsprintfA
GetMenuCheckMarkDimensions
IsCharAlphaNumericW
DrawIconEx
CreateDialogParamW
GetUserObjectInformationA
DialogBoxIndirectParamA
SendDlgItemMessageW
CharNextExA
SetLastErrorEx
GetDlgItem
DrawTextW
LoadAcceleratorsA
wvsprintfW
EnableScrollBar
IsDlgButtonChecked
GrayStringW
IsCharUpperA
SetTimer
SetMenuItemBitmaps
SetDlgItemTextW
GetFocus
keybd_event
GetMessagePos
GetMenuItemCount
GetCaretBlinkTime
SetMenuItemInfoW
LoadStringA
IsChild
AdjustWindowRectEx
GetWindowModuleFileNameW
InternalGetWindowText
CharToOemW
GetActiveWindow
GetParent
LoadImageA
SetDlgItemTextA
AppendMenuA
DestroyCaret
CopyRect
GetKeyboardLayout
VkKeyScanW
SetMenuDefaultItem
InsertMenuItemW
GetKeyNameTextW
CallWindowProcW
GetMonitorInfoW
LookupIconIdFromDirectory
GetClassInfoA
CreateAcceleratorTableW
IsRectEmpty
GetWindowTextA
LoadBitmapA
GetMenuStringW
HideCaret
ClientToScreen
IsCharLowerA
GetKeyState
UpdateWindow
LoadStringW
GetDlgCtrlID
InflateRect
ShowCursor
ScreenToClient
DefWindowProcA
WaitForInputIdle
ExitWindowsEx
DestroyIcon
CreateIconFromResource
AttachThreadInput
GetClassLongA
InSendMessage
DestroyCursor
CreateCaret
SetSysColors
ScrollWindow
GetWindowDC
HiliteMenuItem
FrameRect
EqualRect
EndPaint
ModifyMenuW
IsDialogMessageW
GetKeyboardLayoutList
LoadAcceleratorsW
DestroyAcceleratorTable
IsWindowVisible
GetGUIThreadInfo
DialogBoxIndirectParamW
PostMessageA
kernel32
GetCommProperties
LeaveCriticalSection
HeapAlloc
GetTempPathW
GetTickCount
GlobalSize
FindResourceExW
GetCurrentThreadId
GetComputerNameW
GetThreadTimes
LoadLibraryExW
GetVersion
MoveFileA
SetFileAttributesW
GetTimeZoneInformation
SetCommTimeouts
FindNextFileA
FormatMessageA
LocalAlloc
SuspendThread
SetCurrentDirectoryA
HeapFree
DeleteFileA
GetThreadContext
GetWindowsDirectoryA
VirtualQuery
SetSystemTime
VirtualProtect
IsValidLanguageGroup
GetCurrentDirectoryW
RegisterWaitForSingleObject
WaitCommEvent
lstrcmpiW
RaiseException
GetACP
ReleaseSemaphore
IsBadReadPtr
SetEvent
GetShortPathNameA
ClearCommBreak
SetUnhandledExceptionFilter
SearchPathW
TlsFree
SetSystemTimeAdjustment
DeleteAtom
GetComputerNameExA
GetModuleHandleA
FreeResource
lstrcpyW
VirtualFree
GetLongPathNameW
SetNamedPipeHandleState
CreateEventA
GetThreadPriority
GetProcessHeap
OpenFile
HeapReAlloc
SetCommMask
GlobalUnlock
Exports
Exports
?GenericOutputInfoYSUh@@YGK_KHE[D
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ