d:\krab\vvezoewezq\bibobl\joueeqess\yyeee\peyiojn.PDB
Static task
static1
Behavioral task
behavioral1
Sample
292e75a6c70ee5facc1aa15dd1a7abf9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
292e75a6c70ee5facc1aa15dd1a7abf9_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
292e75a6c70ee5facc1aa15dd1a7abf9_JaffaCakes118
-
Size
305KB
-
MD5
292e75a6c70ee5facc1aa15dd1a7abf9
-
SHA1
f3fdcd0c7678e304db72fd610305ebca84a4ee9a
-
SHA256
748739b0fe7e6371880a30749c6a2868e51f50a0a94d5895ddd4d31fc1108b30
-
SHA512
57fac23c964df5f9064b70b25ab632c14de81ff53b178a132cb7f2d0d6289ce8824cb32fc90261d7255de7a7eed755bfcc44576e4ec7ed0357157b9d39c73fd5
-
SSDEEP
6144:/Vo82I73nGFL593MEqMhhW2el1vmlEHBHTP31meZ3L0blIJlK:L/3nGx3ME5hvO+oZfJL0blJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 292e75a6c70ee5facc1aa15dd1a7abf9_JaffaCakes118
Files
-
292e75a6c70ee5facc1aa15dd1a7abf9_JaffaCakes118.exe windows:4 windows x86 arch:x86
a0afea8f9aed9ff92ad808b6f107b768
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
GopherGetLocatorTypeA
GopherFindFirstFileA
InternetSetCookieA
SetUrlCacheHeaderData
ShowCertificate
InternetGoOnlineA
gdi32
GetTextColor
CreateScalableFontResourceW
CreateDCW
StrokeAndFillPath
GetNearestColor
DeleteDC
FrameRgn
RoundRect
InvertRgn
GetEnhMetaFileHeader
GetCharABCWidthsW
GetNearestPaletteIndex
SetBrushOrgEx
GetTextExtentPointA
ExtSelectClipRgn
GetCharWidthW
GetDeviceCaps
CreateICW
Rectangle
ResetDCW
kernel32
SetFilePointer
GetLocaleInfoW
VirtualProtect
CreateMutexA
HeapSize
GetStringTypeW
GlobalGetAtomNameA
TlsFree
IsValidCodePage
CompareStringA
LeaveCriticalSection
UnlockFileEx
TlsAlloc
GetVersionExA
ReadFile
TlsSetValue
GetModuleHandleA
LoadLibraryA
HeapDestroy
TerminateProcess
RtlUnwind
GetCurrentProcess
GetCurrentProcessId
FlushFileBuffers
OpenMutexA
GetFileType
GetTickCount
GetPrivateProfileIntW
InterlockedExchange
GetCPInfo
GetModuleFileNameW
WriteFile
HeapCreate
SetEnvironmentVariableA
GetEnvironmentStrings
QueryPerformanceCounter
GetTimeFormatW
HeapAlloc
EnumSystemLocalesA
GetEnvironmentStringsW
GetProcAddress
GetACP
GetStartupInfoW
EnumResourceLanguagesW
SetHandleCount
SetLastError
FindNextFileW
GetUserDefaultLCID
LockFileEx
GetSystemInfo
GetCommandLineA
SetStdHandle
GetExitCodeProcess
CopyFileA
IsValidLocale
HeapFree
CloseHandle
GetCommandLineW
GetSystemTimeAsFileTime
EnterCriticalSection
InitializeCriticalSection
IsBadWritePtr
EnumResourceTypesA
LCMapStringW
DeleteCriticalSection
GetCurrentThread
GetNumberFormatW
GetCurrentThreadId
TlsGetValue
VirtualQuery
FreeEnvironmentStringsW
GetConsoleCP
GetDateFormatA
GetModuleFileNameA
GetSystemDirectoryA
CompareStringW
HeapReAlloc
WideCharToMultiByte
ExitProcess
VirtualFree
VirtualAlloc
UnhandledExceptionFilter
GetStringTypeA
GetOEMCP
LCMapStringA
GetTimeZoneInformation
GetTimeFormatA
GetStdHandle
GetLocaleInfoA
GetStartupInfoA
GetLastError
MultiByteToWideChar
FreeEnvironmentStringsA
shell32
DragQueryPoint
FreeIconList
SheChangeDirExW
SHGetPathFromIDListA
SHGetPathFromIDList
user32
GetWindowContextHelpId
CheckDlgButton
MessageBoxW
FindWindowExA
ShowWindow
SetWindowsHookExA
RegisterClassExA
GetCaretPos
CreateWindowExA
DestroyCursor
GetMenuItemCount
IsDialogMessageW
DdeConnect
MapVirtualKeyExW
OffsetRect
LoadCursorFromFileA
GetSubMenu
ArrangeIconicWindows
RegisterClassA
comdlg32
ChooseFontA
ChooseFontW
comctl32
InitCommonControlsEx
Sections
.text Size: 190KB - Virtual size: 189KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ