C:\JEAQC\OXP\AFSOVED\MNHNEENUS\CFDQEETO.PDB
Static task
static1
Behavioral task
behavioral1
Sample
293c10734742c5cf66d0bdda21c962bb_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
293c10734742c5cf66d0bdda21c962bb_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
293c10734742c5cf66d0bdda21c962bb_JaffaCakes118
-
Size
614KB
-
MD5
293c10734742c5cf66d0bdda21c962bb
-
SHA1
1fa706ab1f59008fd228476721a90398d5b2289a
-
SHA256
9ea84c833b710db2bf63fac6efdaa8a866cf283395df6ce949c1ea91c80d6268
-
SHA512
8c822a659cce88cac66229ca533277211dafdb8024667a04af31feed5aed39d702673b2c00b875ddfcc2785713981f7468d5b64320e3d36e0024d5e3d228885c
-
SSDEEP
12288:8LfBtJCwGxdniuSc2E8Ek9BHqJds6LTUgR72Zo1:8LPJCwGLvN2DEYBHqK6U8j1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 293c10734742c5cf66d0bdda21c962bb_JaffaCakes118
Files
-
293c10734742c5cf66d0bdda21c962bb_JaffaCakes118.exe windows:4 windows x86 arch:x86
bae0c06cf69ead2b9d2fc3adc8c7736c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemTimeAsFileTime
EnterCriticalSection
GetOEMCP
GetCPInfo
HeapReAlloc
LoadLibraryA
GetSystemTime
GetProcAddress
TlsSetValue
GetStartupInfoA
ExitProcess
FreeEnvironmentStringsW
InterlockedDecrement
SetThreadAffinityMask
TlsFree
GetModuleFileNameA
LCMapStringW
GetEnvironmentStringsW
IsBadWritePtr
UnhandledExceptionFilter
GetStringTypeA
ReadFile
TlsGetValue
CompareStringW
GetTimeZoneInformation
RtlUnwind
GetCommandLineA
QueryPerformanceCounter
InterlockedExchange
GetLastError
HeapDestroy
GetLocalTime
CompareStringA
InterlockedIncrement
TerminateProcess
TlsAlloc
GetEnvironmentStrings
GetModuleHandleA
MultiByteToWideChar
GetCurrentProcess
FreeEnvironmentStringsA
VirtualFree
GetStringTypeW
WideCharToMultiByte
GetCurrentThread
HeapFree
InitializeCriticalSection
SetEnvironmentVariableA
SetLastError
VirtualQuery
HeapAlloc
WriteFile
SetFilePointer
GetStdHandle
LocalFileTimeToFileTime
CreateMutexA
VirtualAlloc
SetHandleCount
GetACP
GetCurrentThreadId
CloseHandle
GetCurrentProcessId
LeaveCriticalSection
FlushFileBuffers
GetTickCount
HeapCreate
DeleteCriticalSection
GetFileType
LCMapStringA
OpenMutexA
SetStdHandle
OpenFileMappingW
GetVersion
user32
ScrollWindowEx
GetFocus
CreateWindowStationA
GetPriorityClipboardFormat
GetClipboardFormatNameA
IsCharAlphaA
TileChildWindows
GetIconInfo
GetKeyboardState
EqualRect
FrameRect
SetClassLongA
GetCapture
PostThreadMessageW
DdeGetLastError
CheckMenuRadioItem
BeginDeferWindowPos
DestroyCursor
CharNextExA
RegisterClassExA
CountClipboardFormats
RegisterClassA
SetScrollRange
comdlg32
GetOpenFileNameA
comctl32
CreateStatusWindowW
ImageList_GetDragImage
CreateToolbarEx
InitCommonControlsEx
ImageList_Merge
ImageList_Duplicate
DrawStatusTextW
ImageList_GetIconSize
ImageList_Draw
ImageList_GetBkColor
InitMUILanguage
ImageList_SetBkColor
ImageList_GetIcon
CreateMappedBitmap
ImageList_AddIcon
ImageList_LoadImageW
ImageList_Add
Sections
.text Size: 371KB - Virtual size: 371KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ