U:\kSHukiLNeXhy\shLgQBuweQ\lJjhdvIrvbvuua\qqeUabhDjhcc\pFtoegxc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
29ba16f615fa494f8d80b121cb598221_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
29ba16f615fa494f8d80b121cb598221_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
29ba16f615fa494f8d80b121cb598221_JaffaCakes118
-
Size
153KB
-
MD5
29ba16f615fa494f8d80b121cb598221
-
SHA1
8e83386f7d5b04fdb829a50fc7dacb0cb66c3dd4
-
SHA256
2bac8b7aca2a36fc0e8f9efcfb158ea702778f8544f8889e808db7abe0c9b20f
-
SHA512
6bd85fa98bdbfa5b947289073ebb4208f05fe4b32a8c560df659b1d99e817edc9c408b91655173cbd72778c04cf376b77420b695a40a69c313b37c4856c321be
-
SSDEEP
3072:wbvaR7efDNlgYuR8j66PLgKXUA/mxp0tOJjmO:avaoJlgYOOUcUim/0g
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 29ba16f615fa494f8d80b121cb598221_JaffaCakes118
Files
-
29ba16f615fa494f8d80b121cb598221_JaffaCakes118.exe windows:5 windows x86 arch:x86
0a0e0e96f102da021e23958e5837fd8c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
GetForegroundWindow
ExitWindowsEx
MonitorFromRect
MapDialogRect
PostQuitMessage
GetWindowTextW
LoadAcceleratorsA
AdjustWindowRectEx
DefWindowProcW
ModifyMenuW
GetKeyNameTextW
InflateRect
DestroyAcceleratorTable
GetClientRect
DestroyCaret
MapVirtualKeyW
CreateCursor
EnableWindow
HideCaret
GetDlgCtrlID
IsWindowEnabled
SendDlgItemMessageA
DeleteMenu
CharNextA
CharUpperBuffA
MapVirtualKeyExW
GetMessageW
GetNextDlgTabItem
GetKeyboardLayoutNameW
wvsprintfA
OpenIcon
AppendMenuW
DispatchMessageW
LoadBitmapW
DefFrameProcA
UpdateWindow
GetShellWindow
SetWindowLongW
CharToOemBuffA
SetDlgItemTextW
SetScrollPos
CharNextW
GetUpdateRect
AppendMenuA
ShowWindow
comctl32
ImageList_Write
ImageList_Read
CreatePropertySheetPageA
CreateStatusWindowW
ImageList_Destroy
kernel32
AddAtomA
GetLocalTime
GetProcessHeap
GetVersionExA
GetSystemDirectoryA
HeapAlloc
FileTimeToSystemTime
GetSystemDefaultUILanguage
GetModuleHandleA
VirtualQuery
MapViewOfFile
GetComputerNameExA
SetupComm
GetSystemWindowsDirectoryA
GetThreadContext
GetCompressedFileSizeW
GetCommState
lstrcpyW
HeapFree
GetCurrentThread
GetFileTime
SetWaitableTimer
GetCurrentDirectoryW
msvcrt
_controlfp
strspn
__set_app_type
atoi
isprint
__p__fmode
__p__commode
strcspn
_amsg_exit
iswspace
_initterm
puts
realloc
vsprintf
wcstol
_acmdln
exit
_ismbblead
isdigit
strrchr
time
setvbuf
_XcptFilter
_exit
_cexit
__setusermatherr
__getmainargs
gdi32
DPtoLP
ExcludeClipRect
SetWindowExtEx
Escape
UnrealizeObject
Polyline
SetDIBits
IntersectClipRect
CreateSolidBrush
GetROP2
GetSystemPaletteEntries
CreateCompatibleDC
SelectPalette
RemoveFontResourceW
SetPixel
GetTextExtentPoint32A
CreatePalette
CreateDIBSection
CreateEllipticRgnIndirect
shlwapi
PathRemoveBlanksW
StrToIntA
StrNCatW
Exports
Exports
?MediaTypeW@@YGXDPAMPAFN*Z
?GetProviderW@@YGFPAK*Z
?PutClassEx@@YGPAGFGEF*Z
?RemoveMemoryExW@@YGDHF*Z
?PutFolderPathW@@YGPAFPADK*Z
?FormatClassA@@YGPAJFPA_NPANK*Z
?EnumPointerExW@@YGDHE*Z
?CopyFullNameA@@YGE_NMPAH_N*Z
Sections
.text Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ditxt Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dimp Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dbug Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dbg Size: 512B - Virtual size: 92B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vars0 Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vptr0 Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.strs Size: 1024B - Virtual size: 673B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ