C:\formgrabber\formgrabber\loader\Release\loader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
22c0ce4a08734f524007e3126ee32cf9_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
22c0ce4a08734f524007e3126ee32cf9_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
22c0ce4a08734f524007e3126ee32cf9_JaffaCakes118
-
Size
65KB
-
MD5
22c0ce4a08734f524007e3126ee32cf9
-
SHA1
8d57b499039827cc9d1b30e5c041f6df726467cf
-
SHA256
62c7ab2edd5e4f5a7ff8d9342b22d132a62f5a7b85d28e447e25f9ce60258b96
-
SHA512
7136163c4dabe9a03eafedc47cd5ce43a9de98d12553e2df65d96f319e6d74d3c54825f700f7851e0db694a3554acfa8bcf4138af3de2ad5502b44967189de80
-
SSDEEP
1536:WE73hpquaKz62phim5wcTpigOtzh4qU9u:WK3hY2p4cNidtt4qw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 22c0ce4a08734f524007e3126ee32cf9_JaffaCakes118
Files
-
22c0ce4a08734f524007e3126ee32cf9_JaffaCakes118.exe windows:5 windows x86 arch:x86
465cfaa7963ca2244abd2e569cd44229
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
??1type_info@@UAE@XZ
?terminate@@YAXXZ
??3@YAXPAX@Z
_except_handler3
wcsncmp
strcat
strlen
_stricmp
_CxxThrowException
wcsstr
??2@YAPAXI@Z
strcmp
sprintf
_strlwr
memset
strstr
free
wcstombs
calloc
strcpy
winspool.drv
AddPrintProvidorA
DeletePrintProvidorA
kernel32
GetLastError
WideCharToMultiByte
GetPrivateProfileStringA
GetProcAddress
LoadLibraryA
TerminateProcess
MultiByteToWideChar
GetACP
MoveFileExA
LocalFree
GetSystemDirectoryW
InterlockedDecrement
CreateFileA
OutputDebugStringA
GetModuleFileNameW
CopyFileW
FindNextFileA
DeleteFileA
FindFirstFileA
GetVersionExA
user32
ShowWindow
UpdateWindow
GetMessageW
MessageBoxA
SetDlgItemTextA
wsprintfW
GetWindowTextA
gdi32
BitBlt
advapi32
RegQueryValueExA
RegEnumKeyA
RegOpenKeyA
shell32
SHGetFolderPathW
SHGetFolderPathA
ole32
CoInitializeEx
CoInitializeSecurity
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
SysAllocString
SysFreeString
VariantInit
VariantClear
Sections
.flat Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.decrypt Size: 512B - Virtual size: 255B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dll Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.inject Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.strings Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ