c:\slu\etkck\gkzsk\esgectq\epj\eebmvee.pdb
Static task
static1
Behavioral task
behavioral1
Sample
251e0e45d7bcb84d16b3b12dc42ee723_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
251e0e45d7bcb84d16b3b12dc42ee723_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
251e0e45d7bcb84d16b3b12dc42ee723_JaffaCakes118
-
Size
712KB
-
MD5
251e0e45d7bcb84d16b3b12dc42ee723
-
SHA1
874946c6107fb6fca376f0b5ec234aea32fe5f8c
-
SHA256
e5a8cde7c93c2fa7110f2b141804b6fc2901fa507831a3d6f1ac5b63dcec8f2e
-
SHA512
72780375b49f3bda85adc7412ab646210af9475addcea4104437bf71aa79e683e895d1d6f648761268f48e1d8444f246e67c68a7745775e607929a55b3047591
-
SSDEEP
12288:Gs48O1dp1mU2Wea1yHPkVhVknKJlET8nRY6jOjI8wm2Vi5:gBdpQw6M/VYInRY6qs1i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 251e0e45d7bcb84d16b3b12dc42ee723_JaffaCakes118
Files
-
251e0e45d7bcb84d16b3b12dc42ee723_JaffaCakes118.exe windows:4 windows x86 arch:x86
7004a0442f4b1521073e4267af98cf7f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
_TrackMouseEvent
PropertySheetA
InitCommonControlsEx
ImageList_DrawEx
ord17
kernel32
UnhandledExceptionFilter
GetFileType
EnterCriticalSection
TlsSetValue
GetLocaleInfoW
FreeEnvironmentStringsA
GetUserDefaultLCID
FreeLibrary
GetStdHandle
SetFilePointer
GetCurrentProcess
CreateFileA
GetCurrentThreadId
FlushFileBuffers
HeapAlloc
HeapSize
ReadFile
InterlockedDecrement
GetConsoleCP
FreeEnvironmentStringsW
GetModuleHandleW
GetStringTypeA
GetConsoleOutputCP
GetDateFormatA
GetSystemTimeAsFileTime
SetStdHandle
WriteFile
SetUnhandledExceptionFilter
GetCurrentProcessId
WideCharToMultiByte
VirtualAlloc
GetTimeZoneInformation
DeleteCriticalSection
LCMapStringA
GetModuleFileNameW
IsValidCodePage
IsValidLocale
GetOEMCP
SetHandleCount
LoadLibraryA
RaiseException
QueryPerformanceCounter
WriteConsoleW
GetACP
HeapReAlloc
Sleep
GetCPInfo
GetEnvironmentStringsW
SetEnvironmentVariableA
IsDebuggerPresent
InitializeCriticalSection
CompareStringA
TlsFree
SetConsoleCtrlHandler
HeapCreate
GetModuleHandleA
CreateMutexW
GetModuleFileNameA
InterlockedIncrement
SetLastError
GetConsoleMode
GetTimeFormatA
GetCommandLineA
GetStringTypeW
GetCommandLineW
GetLocaleInfoA
LeaveCriticalSection
GetStartupInfoA
GetEnvironmentStrings
CloseHandle
InterlockedExchange
LCMapStringW
TlsGetValue
GetVersionExA
RtlUnwind
VirtualQuery
GetLastError
HeapFree
GetProcAddress
FatalAppExitA
WriteConsoleA
GetTickCount
VirtualFree
GetCurrentThread
HeapDestroy
MultiByteToWideChar
TlsAlloc
GetStartupInfoW
CompareStringW
ExitProcess
TerminateProcess
GetProcessHeap
gdi32
CreateRoundRectRgn
LPtoDP
SelectPalette
CreatePatternBrush
StretchDIBits
CreateCompatibleDC
GetTextExtentPoint32A
GetClipRgn
CreatePalette
ScaleViewportExtEx
GetWindowOrgEx
GetObjectA
GetBkMode
MaskBlt
GetTextExtentPointA
RoundRect
RectVisible
GetCurrentObject
BitBlt
SetTextAlign
SetPaletteEntries
MoveToEx
CreateSolidBrush
PtVisible
DeleteDC
EqualRgn
DeleteObject
StartDocA
GetViewportOrgEx
GetStockObject
EnumFontFamiliesExA
EndDoc
LineTo
SetTextJustification
GetBitmapBits
Arc
ExtTextOutW
SetBkMode
Pie
PolyBezierTo
OffsetViewportOrgEx
GetGlyphOutlineA
StartPage
Escape
CreateBitmap
SetWindowOrgEx
OffsetRgn
GetFontData
GetMapMode
GetPaletteEntries
SetPixel
SaveDC
GetDeviceCaps
PatBlt
SetROP2
CreateCompatibleBitmap
RectInRegion
GetCurrentPositionEx
GetTextMetricsA
RestoreDC
SetTextColor
ExtSelectClipRgn
SetRectRgn
Polyline
FillRgn
Ellipse
GetWindowExtEx
CreateRectRgnIndirect
CreateFontIndirectA
ScaleWindowExtEx
CreateHatchBrush
SetViewportExtEx
SelectObject
CreatePolygonRgn
EndPage
GetViewportExtEx
SetBkColor
StretchBlt
GetBkColor
StrokePath
CombineRgn
OffsetClipRgn
Polygon
GetTextExtentPoint32W
GetClipBox
SetPolyFillMode
SetStretchBltMode
CreateDIBitmap
advapi32
CreateServiceA
LookupPrivilegeValueA
OpenProcessToken
DeleteService
RegCreateKeyA
RegOpenKeyA
RegQueryValueExA
OpenSCManagerA
StartServiceA
RegSetValueA
RegQueryValueA
InitializeSecurityDescriptor
QueryServiceConfigA
RegDeleteValueA
CloseServiceHandle
RegCloseKey
OpenServiceA
AdjustTokenPrivileges
RegSetValueExA
ControlService
RegEnumValueA
GetUserNameA
RegEnumKeyA
RegCreateKeyExA
SetSecurityDescriptorDacl
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
user32
IsWindowVisible
PtInRect
LoadMenuW
MapDialogRect
DeleteMenu
IsDlgButtonChecked
DialogBoxParamW
DrawIconEx
SetDlgItemInt
IsMenu
LoadBitmapW
IsZoomed
RegisterClassW
TrackPopupMenuEx
CreateWindowExW
IsClipboardFormatAvailable
GetSubMenu
SetParent
GetFocus
EnableWindow
GetMenuStringW
UpdateWindow
SendMessageW
GetWindowRect
SetWindowPos
InsertMenuW
SetWindowTextW
GetAsyncKeyState
LoadCursorW
IsRectEmpty
LoadImageW
OffsetRect
IsChild
SetTimer
SetFocus
DialogBoxIndirectParamW
SetMenuDefaultItem
DrawTextW
CheckDlgButton
EqualRect
TranslateMessage
EmptyClipboard
SetWindowLongW
GetKeyboardLayout
IsWindow
GetDC
CreateDialogIndirectParamW
GetMenuItemID
OpenClipboard
GetMenuItemCount
SystemParametersInfoW
GetWindowPlacement
LoadAcceleratorsW
BeginPaint
PostMessageW
GetClientRect
GetWindowLongW
KillTimer
CallWindowProcW
InvalidateRect
ShowWindow
UnregisterClassA
RegisterClassExW
ScreenToClient
ReleaseCapture
MapWindowPoints
CreatePopupMenu
GetMessageW
RemoveMenu
TrackPopupMenu
IntersectRect
MessageBeep
BringWindowToTop
GetSystemMetrics
GetCapture
ChildWindowFromPoint
PostQuitMessage
EnableMenuItem
TranslateAcceleratorW
GetDlgCtrlID
SetMenuItemInfoW
GetSysColorBrush
DestroyAcceleratorTable
CharUpperW
DefWindowProcW
GetParent
MessageBoxW
LoadIconW
EndDialog
GetDlgItem
SetClipboardData
FindWindowW
SetActiveWindow
ReleaseDC
ClientToScreen
SetCursor
GetWindowTextLengthW
GetMessagePos
wsprintfA
GetClassNameW
DestroyWindow
RegisterWindowMessageW
SetWindowsHookExW
LoadStringW
CallNextHookEx
RedrawWindow
GetCursorPos
SetScrollInfo
IsWindowEnabled
SetMenu
CreateDialogParamW
PeekMessageW
WindowFromPoint
UnhookWindowsHookEx
LockWindowUpdate
SetCapture
GetKeyState
SetDlgItemTextW
DispatchMessageW
SetRectEmpty
AppendMenuW
GetWindow
GetClassInfoExW
EndPaint
GetClipboardData
GetDoubleClickTime
Sections
.text Size: 112KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 460KB - Virtual size: 457KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ