f:\ktns\waobescf\htetexfee\gqu\fvuem\oqgorrkvh.PDB
Static task
static1
Behavioral task
behavioral1
Sample
26875071b989b7cc1f1a1c9cd8acf35d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
26875071b989b7cc1f1a1c9cd8acf35d_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
26875071b989b7cc1f1a1c9cd8acf35d_JaffaCakes118
-
Size
720KB
-
MD5
26875071b989b7cc1f1a1c9cd8acf35d
-
SHA1
b22927ef4a38a39c79bfa46b47ff69694501b490
-
SHA256
689b976344d5a3cb8f1f8b653f2ff069306556279a1fe3ecd489d6b7b378235d
-
SHA512
3208e9a4fadaeb25041399d39e04ec8f0c794a4ebd0650604e6a4021af4f7b747e5ddc2d60229d0dd3c9727c8b02ee301c5f756a7c56e33653c594f0eb9ebc23
-
SSDEEP
12288:soZ+WuzHEh4dxx6dDIYfjOQRwO8J1W9dKFuvxG4cAcExFCsqpvH6tutjMUWNS1dK:s3rzfdxodsWjxiW9Emgj9aFCSuRH0b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 26875071b989b7cc1f1a1c9cd8acf35d_JaffaCakes118
Files
-
26875071b989b7cc1f1a1c9cd8acf35d_JaffaCakes118.exe windows:4 windows x86 arch:x86
1d2b73416e5c57a2fc0bbf12a3bdb5dd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
CreateMenu
DestroyWindow
SendDlgItemMessageA
GetClassNameA
GetSystemMetrics
EndPaint
CloseDesktop
DefWindowProcA
ToUnicodeEx
ValidateRect
SendIMEMessageExA
InSendMessage
ScrollWindowEx
MessageBoxA
CharToOemW
GetKeyboardLayoutNameA
RegisterClassExA
CopyImage
CreateWindowExW
ReleaseCapture
RegisterClassA
ShowWindow
comctl32
CreatePropertySheetPageA
ImageList_LoadImageA
CreateStatusWindowA
ImageList_SetDragCursorImage
ImageList_GetFlags
ImageList_SetOverlayImage
ImageList_SetIconSize
ImageList_DragEnter
ImageList_BeginDrag
ImageList_SetImageCount
CreateMappedBitmap
ImageList_SetFlags
CreatePropertySheetPage
CreateUpDownControl
ImageList_Create
InitMUILanguage
ImageList_EndDrag
_TrackMouseEvent
CreateStatusWindowW
ImageList_Copy
ImageList_ReplaceIcon
InitCommonControlsEx
kernel32
GetCurrentProcessId
GetSystemTime
GetStartupInfoA
HeapFree
WaitCommEvent
ReadFile
DeleteAtom
FreeEnvironmentStringsW
GetStringTypeW
LoadLibraryA
GetEnvironmentStringsW
HeapCreate
GetOEMCP
MultiByteToWideChar
RtlUnwind
GetLastError
SetConsoleCursorInfo
GetModuleFileNameA
WriteFile
GetEnvironmentStrings
VirtualAlloc
DeleteCriticalSection
GetLogicalDriveStringsA
SetStdHandle
GetFileTime
CompareStringW
ExitProcess
InterlockedDecrement
LockFile
WideCharToMultiByte
IsBadWritePtr
SetHandleCount
CreateMutexW
InterlockedIncrement
CreateProcessW
GetTickCount
OpenMutexA
EnterCriticalSection
GetDiskFreeSpaceExW
LCMapStringA
GetSystemTimeAsFileTime
SetFilePointer
GetVersion
GetModuleHandleA
FlushFileBuffers
GetLocalTime
GetStdHandle
HeapDestroy
GetCurrentProcess
GetACP
GetConsoleScreenBufferInfo
DuplicateHandle
CompareStringA
IsValidLocale
FreeEnvironmentStringsA
GetFileType
GetCurrentThreadId
GetCurrentThread
HeapReAlloc
SetConsoleActiveScreenBuffer
ReadConsoleOutputW
GetTimeZoneInformation
TlsGetValue
InterlockedExchange
LCMapStringW
UnhandledExceptionFilter
TlsAlloc
GetProcAddress
lstrlen
GetCommandLineA
CreateMutexA
QueryPerformanceCounter
CloseHandle
SetEnvironmentVariableA
HeapAlloc
TerminateProcess
LeaveCriticalSection
VirtualQuery
SetLocalTime
SetLastError
VirtualFree
GetCPInfo
GetAtomNameA
TlsSetValue
TlsFree
GetVolumeInformationA
InitializeCriticalSection
GetStringTypeA
Sections
.text Size: 504KB - Virtual size: 502KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ