W:\ofBeoZE\maylSoy\cOHRzfu\XHJohmJl\iWfrZ.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2103334e0e9c1b693eb8968c94d20e1f_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2103334e0e9c1b693eb8968c94d20e1f_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
2103334e0e9c1b693eb8968c94d20e1f_JaffaCakes118
-
Size
117KB
-
MD5
2103334e0e9c1b693eb8968c94d20e1f
-
SHA1
f08b0db6ccc1ba4e3509b5bdacf4eef5afc82143
-
SHA256
ca16d59077de98be96a9c9f46b41c82a97d75503714a610250fc2cd1472b0af0
-
SHA512
c724af44a7f92c340141234533cd3a5a923eaf74a0446f7e7e0a81a6fe51975ec495de6416d7c175791d0a0f6bed2149e48dbeaca2a218564ab8d6ee6c1af76e
-
SSDEEP
3072:BpPvEqnyMKUT0gP9zfQTOnh34ccRuNvT0DlOUq:BOqvKUI29kMV4ccasPq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2103334e0e9c1b693eb8968c94d20e1f_JaffaCakes118
Files
-
2103334e0e9c1b693eb8968c94d20e1f_JaffaCakes118.exe windows:5 windows x86 arch:x86
61a6868b247dda572eb81a3bce9cb81a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
StrSpnA
ntdll
_stricmp
kernel32
GlobalMemoryStatus
GetCurrentThreadId
SleepEx
GetCommProperties
InterlockedExchange
GetCurrentProcessId
SetCurrentDirectoryW
InterlockedExchangeAdd
lstrcpyA
LoadLibraryA
ExitProcess
gdi32
SelectPalette
GetNearestColor
EnumFontsW
StartPage
SetWindowOrgEx
CreatePolygonRgn
comdlg32
GetOpenFileNameA
PageSetupDlgW
GetSaveFileNameA
user32
GetUserObjectInformationW
OpenDesktopW
AllowSetForegroundWindow
CheckDlgButton
SetMenuDefaultItem
LoadMenuW
CharUpperA
SetSysColors
OemToCharBuffA
DefDlgProcW
CascadeWindows
SetWindowPlacement
DragObject
AppendMenuA
Exports
Exports
?TCd_uF_DO@@YGPAEPA_N@Z
?NWJIDORG_L_Kx_@@YGPAFKH@Z
?M__WWQXD@@YGXMM@Z
?O_JGFFZVSD@@YG_NPA_NPAF@Z
?WRTbspi_h_oyVL@@YGDF@Z
?l_f_xt_vs_xoumQsog@@YGKPAM@Z
?T__NHW_@@YGHPAHPAF@Z
?xx_u_oakcmv__@@YGNPADD@Z
?WID_Wttmleuf__tw@@YGKPAK@Z
?NZUBKD_hOMZAI___WKZQS@@YGEPAI@Z
?voiuioogr_xdygun_gz__@@YGPADJPAE@Z
?q_v_lxmd@@YGPAX_NPAM@Z
?Y_JQSIMPGY_IC_Vuid_@@YGPAIJJ@Z
?oyvhsz_i__huo@@YGJIH@Z
?v_d_yybhHPupiL___p@@YGIHPAD@Z
?wHZV_C_M@@YGIGI@Z
?XVItc_ek@@YGIPAED@Z
Sections
.code Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 918B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.import Size: 1024B - Virtual size: 1020B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ