R:\ujrMvmlzw\cTcuFnwYguxzG\ygkojaecd\IjZwjxqR.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1aeefaee6735f46554ba936fc8672007_JaffaCakes118.dll
Resource
win7-20240220-en
General
-
Target
1aeefaee6735f46554ba936fc8672007_JaffaCakes118
-
Size
756KB
-
MD5
1aeefaee6735f46554ba936fc8672007
-
SHA1
b154206b3cdf55255bd815d0aae6042ccb5a7124
-
SHA256
e25b1ac0087151569a95c56aaaea483c10d317ec2b5387be5a17e7e8656b2e5c
-
SHA512
c0b24339d96f7a425c378c481078af8c794285f14806caee73de2b2a3fa8edd3c9f5639b1815ff8ab787038868cfd11a01c2a8cb58070f132cd0a5909fab44b7
-
SSDEEP
12288:cshvDB0WLMstn5/9/UJk56+zeyrwWaVo2KxkzcaiMUy7lpVWbSmf/coKjoilRKjX:csJDB++n5/e656BhnmyUy7lWbSG/LkoN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1aeefaee6735f46554ba936fc8672007_JaffaCakes118
Files
-
1aeefaee6735f46554ba936fc8672007_JaffaCakes118.dll windows:5 windows x86 arch:x86
2ce2ddf8ce0b058b2f55c7e4cb16a1de
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
comdlg32
PrintDlgW
GetOpenFileNameW
GetSaveFileNameA
shlwapi
StrToIntExA
StrCatBuffA
msvcrt
_controlfp
__set_app_type
wcscspn
__p__fmode
__p__commode
_amsg_exit
swscanf
_initterm
fseek
towlower
_acmdln
exit
_ismbblead
_XcptFilter
_exit
strcoll
iswxdigit
strtol
strstr
_cexit
__setusermatherr
putchar
__getmainargs
puts
gmtime
strncmp
kernel32
GetModuleHandleA
DeleteAtom
SuspendThread
WaitCommEvent
FreeResource
LocalFree
LoadResource
IsBadReadPtr
lstrlenA
GetFileAttributesExW
LocalReAlloc
GetModuleFileNameW
IsValidLanguageGroup
GetCommProperties
FindFirstFileW
GetPriorityClass
FindNextFileW
lstrcmpA
LoadLibraryW
FindNextFileA
ConvertDefaultLocale
FindNextChangeNotification
gdi32
TextOutA
EnumFontsW
AddFontResourceW
CreateFontW
SetPaletteEntries
GetRgnBox
BeginPath
PatBlt
GetTextExtentPointW
GetCharWidth32W
ExcludeClipRect
RoundRect
FillRgn
CreatePenIndirect
CreateBrushIndirect
GetFontData
SetViewportOrgEx
DeleteDC
CreatePolygonRgn
user32
GetKeyboardLayout
ShowScrollBar
ShowWindowAsync
DestroyWindow
CreateMenu
GetNextDlgGroupItem
DrawFrameControl
SetCaretPos
TrackPopupMenu
GetWindowTextLengthW
GetMenuItemInfoW
SetWindowLongW
OemToCharBuffA
GetTopWindow
GrayStringW
GetFocus
GetMenu
CharPrevW
CharNextA
mouse_event
AllowSetForegroundWindow
FindWindowExA
GetShellWindow
MoveWindow
GetDlgCtrlID
IsCharAlphaNumericW
GetMenuCheckMarkDimensions
GetCursorPos
OpenDesktopW
SetCursor
DefWindowProcA
FindWindowA
EnableWindow
CopyAcceleratorTableW
MonitorFromRect
DrawTextW
GetKeyboardLayoutNameW
GetMessagePos
SetTimer
OemToCharA
DestroyIcon
ShowWindow
GetUserObjectInformationA
IsCharLowerA
Exports
Exports
?LoadAppNameA@@YGEKPAHF~U
showtitle
?LoadListOriginal@@YGIHPAMK_N~U
?CopyVersionNew@@YGIJPA_NPAM~U
?ExecuteLoaderTrayXBwyGD@@YGKGHE@Z
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kip Size: 1024B - Virtual size: 520B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ticy Size: 512B - Virtual size: 447B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ticx Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zdata Size: 512B - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.heap Size: - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 725KB - Virtual size: 724KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ