C:\JEAQC\OXP\AFSOVED\MNHNEENUS\CFDQEETO.PDB
Static task
static1
Behavioral task
behavioral1
Sample
2944b98ecf03f13b3043461cb0f3ed0f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2944b98ecf03f13b3043461cb0f3ed0f_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2944b98ecf03f13b3043461cb0f3ed0f_JaffaCakes118
-
Size
614KB
-
MD5
2944b98ecf03f13b3043461cb0f3ed0f
-
SHA1
274f2ce5ab4ee776f9edbcae8134586a098430c1
-
SHA256
3c4433b723e47543a0764739040c48f35b23a85d67dab06ddcb31afb06bbf7bf
-
SHA512
ce371ba0ad5fafdabd18843a88f5b13c866756b86f38291ebefbddae036bde52feb561a21a50d517923326cffdf1ae22b5d75b05e0d5702ecb908f5bbab54cd0
-
SSDEEP
12288:ULfBtJCwGxdniuSc2E8Ek9BHqJds6LTUgR72Zo1:ULPJCwGLvN2DEYBHqK6U8j1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2944b98ecf03f13b3043461cb0f3ed0f_JaffaCakes118
Files
-
2944b98ecf03f13b3043461cb0f3ed0f_JaffaCakes118.exe windows:4 windows x86 arch:x86
bae0c06cf69ead2b9d2fc3adc8c7736c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemTimeAsFileTime
EnterCriticalSection
GetOEMCP
GetCPInfo
HeapReAlloc
LoadLibraryA
GetSystemTime
GetProcAddress
TlsSetValue
GetStartupInfoA
ExitProcess
FreeEnvironmentStringsW
InterlockedDecrement
SetThreadAffinityMask
TlsFree
GetModuleFileNameA
LCMapStringW
GetEnvironmentStringsW
IsBadWritePtr
UnhandledExceptionFilter
GetStringTypeA
ReadFile
TlsGetValue
CompareStringW
GetTimeZoneInformation
RtlUnwind
GetCommandLineA
QueryPerformanceCounter
InterlockedExchange
GetLastError
HeapDestroy
GetLocalTime
CompareStringA
InterlockedIncrement
TerminateProcess
TlsAlloc
GetEnvironmentStrings
GetModuleHandleA
MultiByteToWideChar
GetCurrentProcess
FreeEnvironmentStringsA
VirtualFree
GetStringTypeW
WideCharToMultiByte
GetCurrentThread
HeapFree
InitializeCriticalSection
SetEnvironmentVariableA
SetLastError
VirtualQuery
HeapAlloc
WriteFile
SetFilePointer
GetStdHandle
LocalFileTimeToFileTime
CreateMutexA
VirtualAlloc
SetHandleCount
GetACP
GetCurrentThreadId
CloseHandle
GetCurrentProcessId
LeaveCriticalSection
FlushFileBuffers
GetTickCount
HeapCreate
DeleteCriticalSection
GetFileType
LCMapStringA
OpenMutexA
SetStdHandle
OpenFileMappingW
GetVersion
user32
ScrollWindowEx
GetFocus
CreateWindowStationA
GetPriorityClipboardFormat
GetClipboardFormatNameA
IsCharAlphaA
TileChildWindows
GetIconInfo
GetKeyboardState
EqualRect
FrameRect
SetClassLongA
GetCapture
PostThreadMessageW
DdeGetLastError
CheckMenuRadioItem
BeginDeferWindowPos
DestroyCursor
CharNextExA
RegisterClassExA
CountClipboardFormats
RegisterClassA
SetScrollRange
comdlg32
GetOpenFileNameA
comctl32
CreateStatusWindowW
ImageList_GetDragImage
CreateToolbarEx
InitCommonControlsEx
ImageList_Merge
ImageList_Duplicate
DrawStatusTextW
ImageList_GetIconSize
ImageList_Draw
ImageList_GetBkColor
InitMUILanguage
ImageList_SetBkColor
ImageList_GetIcon
CreateMappedBitmap
ImageList_AddIcon
ImageList_LoadImageW
ImageList_Add
Sections
.text Size: 371KB - Virtual size: 371KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ