C:\JEAQC\OXP\AFSOVED\MNHNEENUS\CFDQEETO.PDB
Static task
static1
Behavioral task
behavioral1
Sample
26c576d6c7e76b3784aeca6f86424c73_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
26c576d6c7e76b3784aeca6f86424c73_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
26c576d6c7e76b3784aeca6f86424c73_JaffaCakes118
-
Size
614KB
-
MD5
26c576d6c7e76b3784aeca6f86424c73
-
SHA1
4de071f3761121179e55a19017febb42c02c0e1c
-
SHA256
e1eb75801e80380648fc4b6ffdb0a5f52c59b568b281c311ce8016bbcdd31810
-
SHA512
d74063338869ad334f51c31e954202c0464c291aab9a84374183173f1bbc42b006c6ec57896ba83249631bd19ee25b6e0d2e01f2302da16a87090206fc2ace53
-
SSDEEP
12288:ULfBtJCwGxdniuSc2E8Ek9BHqJds6LTUgR72Zo1:ULPJCwGLvN2DEYBHqK6U8j1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 26c576d6c7e76b3784aeca6f86424c73_JaffaCakes118
Files
-
26c576d6c7e76b3784aeca6f86424c73_JaffaCakes118.exe windows:4 windows x86 arch:x86
bae0c06cf69ead2b9d2fc3adc8c7736c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemTimeAsFileTime
EnterCriticalSection
GetOEMCP
GetCPInfo
HeapReAlloc
LoadLibraryA
GetSystemTime
GetProcAddress
TlsSetValue
GetStartupInfoA
ExitProcess
FreeEnvironmentStringsW
InterlockedDecrement
SetThreadAffinityMask
TlsFree
GetModuleFileNameA
LCMapStringW
GetEnvironmentStringsW
IsBadWritePtr
UnhandledExceptionFilter
GetStringTypeA
ReadFile
TlsGetValue
CompareStringW
GetTimeZoneInformation
RtlUnwind
GetCommandLineA
QueryPerformanceCounter
InterlockedExchange
GetLastError
HeapDestroy
GetLocalTime
CompareStringA
InterlockedIncrement
TerminateProcess
TlsAlloc
GetEnvironmentStrings
GetModuleHandleA
MultiByteToWideChar
GetCurrentProcess
FreeEnvironmentStringsA
VirtualFree
GetStringTypeW
WideCharToMultiByte
GetCurrentThread
HeapFree
InitializeCriticalSection
SetEnvironmentVariableA
SetLastError
VirtualQuery
HeapAlloc
WriteFile
SetFilePointer
GetStdHandle
LocalFileTimeToFileTime
CreateMutexA
VirtualAlloc
SetHandleCount
GetACP
GetCurrentThreadId
CloseHandle
GetCurrentProcessId
LeaveCriticalSection
FlushFileBuffers
GetTickCount
HeapCreate
DeleteCriticalSection
GetFileType
LCMapStringA
OpenMutexA
SetStdHandle
OpenFileMappingW
GetVersion
user32
ScrollWindowEx
GetFocus
CreateWindowStationA
GetPriorityClipboardFormat
GetClipboardFormatNameA
IsCharAlphaA
TileChildWindows
GetIconInfo
GetKeyboardState
EqualRect
FrameRect
SetClassLongA
GetCapture
PostThreadMessageW
DdeGetLastError
CheckMenuRadioItem
BeginDeferWindowPos
DestroyCursor
CharNextExA
RegisterClassExA
CountClipboardFormats
RegisterClassA
SetScrollRange
comdlg32
GetOpenFileNameA
comctl32
CreateStatusWindowW
ImageList_GetDragImage
CreateToolbarEx
InitCommonControlsEx
ImageList_Merge
ImageList_Duplicate
DrawStatusTextW
ImageList_GetIconSize
ImageList_Draw
ImageList_GetBkColor
InitMUILanguage
ImageList_SetBkColor
ImageList_GetIcon
CreateMappedBitmap
ImageList_AddIcon
ImageList_LoadImageW
ImageList_Add
Sections
.text Size: 371KB - Virtual size: 371KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ