Q:\dgbTtemcaTfo\tlgafppVo\wAvpxqjdJwvH\jumhCtxjzhfbxk.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1c434aede2b7cc703e7ad62927b08238_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1c434aede2b7cc703e7ad62927b08238_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1c434aede2b7cc703e7ad62927b08238_JaffaCakes118
-
Size
212KB
-
MD5
1c434aede2b7cc703e7ad62927b08238
-
SHA1
113a88ca34b3655c8ca37beeb615966aabfdb654
-
SHA256
61a292527a08c9246bf9a65afd3a889e17e5a8e2cd978004c696a021a0d1b18a
-
SHA512
c672c975026fad56a7cdc31ed7cabc0d5c70088a31a6f213f5008e0ef4bf2c2e6e1e5e0a7c2278e0e6b7abdef2f0ddebac7f514a0f9f3e46bc8978e8392384dd
-
SSDEEP
3072:yEUroHTcklyg9x8MC4/UF85VkLESK/oKq09LYd0ysiryDOqmxt3T/ZbPc8:bU0HTc72DY84I1q09L+0ysirgOqAttt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1c434aede2b7cc703e7ad62927b08238_JaffaCakes118
Files
-
1c434aede2b7cc703e7ad62927b08238_JaffaCakes118.exe windows:5 windows x86 arch:x86
0b50550ec5a360d2217547c3621fdc09
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
LookupPrivilegeDisplayNameA
comdlg32
ReplaceTextW
GetSaveFileNameW
GetFileTitleW
FindTextW
msvcrt
strspn
fputs
fprintf
strcspn
fread
_controlfp
__set_app_type
__p__fmode
fclose
__p__commode
strtok
_amsg_exit
wcscspn
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
iswxdigit
_cexit
__setusermatherr
strncpy
__getmainargs
kernel32
SetCurrentDirectoryW
ResetEvent
GetSystemTimeAsFileTime
LocalReAlloc
GetSystemWindowsDirectoryW
VirtualFree
ConnectNamedPipe
lstrcatW
GetModuleHandleA
EnumSystemLocalesA
CloseHandle
VerifyVersionInfoW
GetCommProperties
GetModuleFileNameA
FreeResource
GetStartupInfoW
TlsFree
DisconnectNamedPipe
gdi32
PtVisible
CreateFontIndirectA
GetBitmapBits
ExtTextOutA
EnumFontFamiliesExW
GetNearestPaletteIndex
GetWindowOrgEx
GetPixel
GetDIBColorTable
SetDIBits
CreateDiscardableBitmap
GetTextAlign
GetTextCharsetInfo
StartDocW
CombineRgn
user32
PostMessageW
GetMessageA
ChangeMenuW
CallWindowProcA
InSendMessage
IsIconic
SetScrollInfo
SetFocus
GetMessageTime
DrawTextExW
DefWindowProcW
ShowOwnedPopups
LockWindowUpdate
GetParent
SetWindowLongA
RemovePropW
CheckRadioButton
GetWindowRect
DrawFrameControl
PostThreadMessageA
IsMenu
SetDlgItemInt
GetMessagePos
ShowWindow
EnumWindows
wsprintfW
OpenDesktopW
SetMenuDefaultItem
DeferWindowPos
AppendMenuW
GetDlgCtrlID
SendMessageW
CreateCaret
DestroyCaret
GetShellWindow
Exports
Exports
?TryEnterCriticalSectionJKDJHLJHKDljfjhl@@YGKEPA_WG@Z
Sections
.text Size: 177KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.diag_y Size: 512B - Virtual size: 82B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idat Size: 512B - Virtual size: 412B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.diag_x Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.div Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.plus Size: 512B - Virtual size: 441B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.minus Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ