h:\goqak\iahxjob.pdb
Static task
static1
Behavioral task
behavioral1
Sample
24582d3688cd2ffebcfa64c665cb7a84_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
24582d3688cd2ffebcfa64c665cb7a84_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
24582d3688cd2ffebcfa64c665cb7a84_JaffaCakes118
-
Size
380KB
-
MD5
24582d3688cd2ffebcfa64c665cb7a84
-
SHA1
d8bb7bfed05b1251a7bf457154ac4393289e3522
-
SHA256
42d5d2e727f37234c980de6953dc3d8766cf4ed2fc045819624f4c75644dee8f
-
SHA512
f1fb3db20efbe6c3756691fc430c21cf19665ee152fe60bd0982c3bc3ae9f001e6d8d6ffa6de7ea8032cbe74667f5f963195ebd02701d0d1eb3e6361629effd4
-
SSDEEP
6144:53Qv3J5hyCBBSHZStLexqa7YjiHJU3kUxNJGR2VSwg2bR:g3Th5BqZ4LexF0jiKxpVq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 24582d3688cd2ffebcfa64c665cb7a84_JaffaCakes118
Files
-
24582d3688cd2ffebcfa64c665cb7a84_JaffaCakes118.exe windows:4 windows x86 arch:x86
828ef86d7ba674901efc02590c1c68af
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
ExtractAssociatedIconA
CheckEscapesW
ShellExecuteExW
wininet
InternetTimeToSystemTimeA
IncrementUrlCacheHeaderData
GetUrlCacheConfigInfoW
GetUrlCacheEntryInfoExA
FtpPutFileA
FindNextUrlCacheContainerW
InternetCrackUrlA
user32
EnumDisplaySettingsExA
OemToCharBuffA
RegisterClassExA
OemKeyScan
DrawTextExA
EnumPropsExA
DeleteMenu
IsWindow
ToUnicode
DrawFocusRect
GetClipCursor
IsCharAlphaA
TrackMouseEvent
GetDoubleClickTime
NotifyWinEvent
SendMessageTimeoutA
CheckMenuRadioItem
ChangeDisplaySettingsExA
GetMonitorInfoW
GetMessageTime
GetDialogBaseUnits
LoadMenuIndirectA
LockWindowUpdate
GetNextDlgGroupItem
CopyImage
CallMsgFilterW
GetMessageA
ChangeClipboardChain
PackDDElParam
CharUpperA
CharUpperBuffW
GetPropW
AppendMenuA
GetMenuInfo
GetComboBoxInfo
AnyPopup
ScrollDC
SetCapture
CreateCursor
MapDialogRect
ShowCaret
GetWindowTextLengthA
GetClassNameW
RegisterClassA
LoadCursorFromFileW
IsDialogMessageW
CallMsgFilterA
SetFocus
DdeUninitialize
ArrangeIconicWindows
SendIMEMessageExA
SetMenuItemInfoA
CreateWindowExA
GetMenuItemID
SetParent
ClientToScreen
RegisterDeviceNotificationA
SetProcessDefaultLayout
MapWindowPoints
SetActiveWindow
DefWindowProcA
SetCaretPos
LoadIconW
LoadImageW
CreateWindowExW
SetMessageQueue
SystemParametersInfoA
UnregisterClassA
RegisterHotKey
SetDlgItemTextA
UnionRect
ExcludeUpdateRgn
MsgWaitForMultipleObjectsEx
VkKeyScanW
SendIMEMessageExW
MessageBoxA
SetWindowContextHelpId
BringWindowToTop
DestroyMenu
CallNextHookEx
GetKBCodePage
DrawEdge
IsCharUpperW
CopyRect
EnumPropsW
GetSysColor
OpenDesktopW
SetUserObjectInformationW
IsChild
InsertMenuItemA
DdeCmpStringHandles
wvsprintfW
CharLowerA
kernel32
IsValidCodePage
DeleteCriticalSection
GetFileType
SetHandleCount
SetConsoleWindowInfo
GetNumberFormatW
RtlUnwind
WriteProfileStringA
LeaveCriticalSection
MoveFileW
IsBadWritePtr
WaitNamedPipeW
FreeEnvironmentStringsA
FindAtomA
SetFilePointer
VirtualAllocEx
GetCPInfo
SetPriorityClass
GetCommandLineW
VirtualAlloc
GetCurrentProcess
CompareStringW
SetStdHandle
GetProcessAffinityMask
GetSystemTime
InterlockedIncrement
EnterCriticalSection
GetSystemInfo
FoldStringW
GetVersion
GetLongPathNameW
EnumSystemLocalesW
InterlockedExchangeAdd
GetSystemTimeAsFileTime
FindResourceW
VirtualFree
QueryPerformanceCounter
FreeResource
GetModuleHandleA
LoadLibraryA
SetLastError
GetEnvironmentStringsW
GetCurrentThread
ExpandEnvironmentStringsW
CreateFileW
CreateSemaphoreA
WideCharToMultiByte
GetTickCount
InterlockedCompareExchange
WriteFile
GetUserDefaultLangID
CompareStringA
LCMapStringW
CreateDirectoryW
ReadFile
GetCurrentThreadId
lstrcmpi
FindFirstFileExW
HeapAlloc
OpenFileMappingA
SetEnvironmentVariableA
FlushFileBuffers
GetTimeZoneInformation
CreateMutexA
TlsGetValue
GetStdHandle
MultiByteToWideChar
OpenFile
EnumResourceLanguagesW
CreateFileMappingA
GetStartupInfoA
GetFileAttributesW
lstrlen
TlsSetValue
HeapReAlloc
WriteProfileStringW
FreeEnvironmentStringsW
GetLocalTime
WritePrivateProfileStructW
GetModuleFileNameW
FlushViewOfFile
GetEnvironmentStrings
GetStringTypeW
GetLastError
InterlockedDecrement
HeapFree
GetModuleFileNameA
LCMapStringA
InterlockedExchange
GetStartupInfoW
WriteConsoleOutputCharacterA
LockResource
WriteConsoleOutputCharacterW
CloseHandle
GetCommandLineA
UnhandledExceptionFilter
HeapDestroy
TerminateProcess
GetShortPathNameW
TransactNamedPipe
GetProcAddress
GetDateFormatA
InitializeCriticalSection
OpenMutexA
OpenProcess
lstrcpy
TlsAlloc
WriteConsoleW
GetModuleHandleW
GetStringTypeA
MapViewOfFileEx
WaitForSingleObjectEx
GetCurrentProcessId
VirtualQuery
GetStringTypeExA
SetCurrentDirectoryA
TlsFree
ExitProcess
HeapCreate
GlobalUnlock
gdi32
CreateDCW
DeleteDC
GetObjectA
SetMagicColors
GetDeviceCaps
comctl32
CreateToolbarEx
ImageList_GetImageRect
DrawInsert
CreatePropertySheetPage
ImageList_GetImageCount
CreateMappedBitmap
ImageList_GetFlags
ImageList_SetFlags
ImageList_GetBkColor
ImageList_LoadImageW
CreateStatusWindow
CreateStatusWindowA
ImageList_GetIcon
ImageList_GetIconSize
ImageList_LoadImage
DrawStatusText
ImageList_AddMasked
CreateToolbar
ImageList_LoadImageA
InitCommonControlsEx
DrawStatusTextA
ImageList_ReplaceIcon
ImageList_SetFilter
ImageList_Remove
ImageList_DrawIndirect
comdlg32
GetOpenFileNameW
Sections
.text Size: 152KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ