C:\JEAQC\OXP\AFSOVED\MNHNEENUS\CFDQEETO.PDB
Static task
static1
Behavioral task
behavioral1
Sample
287f92fcb6a2e94663b9c7416a20d159_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
287f92fcb6a2e94663b9c7416a20d159_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
287f92fcb6a2e94663b9c7416a20d159_JaffaCakes118
-
Size
614KB
-
MD5
287f92fcb6a2e94663b9c7416a20d159
-
SHA1
cdb6f367c5b7754eb7162989838fe8fddd0c18c0
-
SHA256
778acb0015fe4dfda2bb272bf81b68082803af084e751bb340500ab0178b40b5
-
SHA512
4f2a26827a882ac7dfb3f02d02547e6a9fbb1f1d099635dced667f6d62c0cb093387eda24192301bbd5bf07ee7b23895c816b51ee189865c388eb14d49561546
-
SSDEEP
12288:8LfBtJCwGxdniuSc2E8Ek9BHqJds6LTUgR72Zo1:8LPJCwGLvN2DEYBHqK6U8j1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 287f92fcb6a2e94663b9c7416a20d159_JaffaCakes118
Files
-
287f92fcb6a2e94663b9c7416a20d159_JaffaCakes118.exe windows:4 windows x86 arch:x86
bae0c06cf69ead2b9d2fc3adc8c7736c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemTimeAsFileTime
EnterCriticalSection
GetOEMCP
GetCPInfo
HeapReAlloc
LoadLibraryA
GetSystemTime
GetProcAddress
TlsSetValue
GetStartupInfoA
ExitProcess
FreeEnvironmentStringsW
InterlockedDecrement
SetThreadAffinityMask
TlsFree
GetModuleFileNameA
LCMapStringW
GetEnvironmentStringsW
IsBadWritePtr
UnhandledExceptionFilter
GetStringTypeA
ReadFile
TlsGetValue
CompareStringW
GetTimeZoneInformation
RtlUnwind
GetCommandLineA
QueryPerformanceCounter
InterlockedExchange
GetLastError
HeapDestroy
GetLocalTime
CompareStringA
InterlockedIncrement
TerminateProcess
TlsAlloc
GetEnvironmentStrings
GetModuleHandleA
MultiByteToWideChar
GetCurrentProcess
FreeEnvironmentStringsA
VirtualFree
GetStringTypeW
WideCharToMultiByte
GetCurrentThread
HeapFree
InitializeCriticalSection
SetEnvironmentVariableA
SetLastError
VirtualQuery
HeapAlloc
WriteFile
SetFilePointer
GetStdHandle
LocalFileTimeToFileTime
CreateMutexA
VirtualAlloc
SetHandleCount
GetACP
GetCurrentThreadId
CloseHandle
GetCurrentProcessId
LeaveCriticalSection
FlushFileBuffers
GetTickCount
HeapCreate
DeleteCriticalSection
GetFileType
LCMapStringA
OpenMutexA
SetStdHandle
OpenFileMappingW
GetVersion
user32
ScrollWindowEx
GetFocus
CreateWindowStationA
GetPriorityClipboardFormat
GetClipboardFormatNameA
IsCharAlphaA
TileChildWindows
GetIconInfo
GetKeyboardState
EqualRect
FrameRect
SetClassLongA
GetCapture
PostThreadMessageW
DdeGetLastError
CheckMenuRadioItem
BeginDeferWindowPos
DestroyCursor
CharNextExA
RegisterClassExA
CountClipboardFormats
RegisterClassA
SetScrollRange
comdlg32
GetOpenFileNameA
comctl32
CreateStatusWindowW
ImageList_GetDragImage
CreateToolbarEx
InitCommonControlsEx
ImageList_Merge
ImageList_Duplicate
DrawStatusTextW
ImageList_GetIconSize
ImageList_Draw
ImageList_GetBkColor
InitMUILanguage
ImageList_SetBkColor
ImageList_GetIcon
CreateMappedBitmap
ImageList_AddIcon
ImageList_LoadImageW
ImageList_Add
Sections
.text Size: 371KB - Virtual size: 371KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ