f:\saetslgr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
29d1be10106b09deec60f938c1b527c1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
29d1be10106b09deec60f938c1b527c1_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
29d1be10106b09deec60f938c1b527c1_JaffaCakes118
-
Size
622KB
-
MD5
29d1be10106b09deec60f938c1b527c1
-
SHA1
c8bc7669987feedbdc5d595b7cbbca6a44546a94
-
SHA256
efb38d51a3ed7ab4a2d15ffe687c9e4a3304cfd257f21b49631c225abd92a978
-
SHA512
2df1a7a2d4125db82198d1ec1896cede2a2a453133361736a6c7c3ef8c3cad6b5a55f2633ad529a728a0f53a26a71cca21a4d32ee347ec03e0711a5bdc324c0e
-
SSDEEP
12288:w+TUve1N52T8wmAKARvPzdTjRsRdDAC+B4lqt3j4paYA7PguJdbcESgz:lsRINAR1WTZ+qu4MZrbFcE3z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 29d1be10106b09deec60f938c1b527c1_JaffaCakes118
Files
-
29d1be10106b09deec60f938c1b527c1_JaffaCakes118.exe windows:4 windows x86 arch:x86
9ab89360de867105fb9380e636864630
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_Remove
ImageList_GetImageInfo
DrawStatusTextA
_TrackMouseEvent
ImageList_BeginDrag
GetEffectiveClientRect
ImageList_SetImageCount
ImageList_EndDrag
CreatePropertySheetPageW
DrawInsert
ImageList_Read
ImageList_LoadImageA
CreatePropertySheetPageA
CreatePropertySheetPage
ImageList_GetBkColor
InitCommonControlsEx
ImageList_SetOverlayImage
ImageList_LoadImageW
ImageList_GetFlags
ImageList_Destroy
ImageList_DrawIndirect
ImageList_GetDragImage
ImageList_Merge
kernel32
GetCommandLineA
VirtualAlloc
SetLastError
UnhandledExceptionFilter
GetVersionExA
GetFileType
SetHandleCount
VirtualProtect
GetEnvironmentStringsW
FlushFileBuffers
GetShortPathNameW
GetCurrentThread
DebugBreak
GetSystemInfo
LeaveCriticalSection
HeapCreate
GetTickCount
TerminateProcess
FreeEnvironmentStringsW
GetProcAddress
GetTimeFormatA
EnumSystemLocalesA
GetOEMCP
MultiByteToWideChar
GetTimeZoneInformation
HeapDestroy
GetCommandLineW
GetDateFormatA
CompareStringA
ExitProcess
GetACP
GetCurrentProcess
TlsFree
IsBadWritePtr
TlsGetValue
HeapReAlloc
IsValidLocale
IsValidCodePage
HeapAlloc
ReadConsoleOutputAttribute
GetLocaleInfoA
InterlockedIncrement
FreeEnvironmentStringsA
VirtualFree
CloseHandle
GetCurrentProcessId
TlsSetValue
GetModuleFileNameA
GetStringTypeW
OutputDebugStringA
GetEnvironmentStrings
DeleteCriticalSection
HeapFree
GetModuleFileNameW
VirtualQuery
IsBadReadPtr
OpenMutexA
GetLastError
GetStartupInfoW
GetCPInfo
SetStdHandle
GetSystemTimeAsFileTime
CreateMutexA
InterlockedDecrement
LCMapStringA
GetModuleHandleA
LCMapStringW
ReadFile
InitializeCriticalSection
QueryPerformanceCounter
WriteFile
HeapValidate
GetStdHandle
LoadLibraryA
SetFilePointer
SetConsoleCtrlHandler
InterlockedExchange
LocalUnlock
EnterCriticalSection
SetEnvironmentVariableA
GetStartupInfoA
GetLocaleInfoW
LocalCompact
TlsAlloc
GetStringTypeA
GetUserDefaultLCID
CompareStringW
RtlUnwind
GetCurrentThreadId
WideCharToMultiByte
advapi32
RegQueryValueExA
RegLoadKeyW
CryptSetProviderExW
gdi32
CreateDIBitmap
Polyline
GetTextCharsetInfo
LineDDA
CreateSolidBrush
PolyPolygon
comdlg32
PageSetupDlgW
user32
GetPropW
RemovePropW
CharToOemA
DrawCaption
DdeDisconnect
RegisterClassA
MoveWindow
DefWindowProcW
DefWindowProcA
CreateWindowExA
EndDialog
SetClipboardViewer
DestroyWindow
GetDCEx
InsertMenuItemA
RegisterClassExA
UpdateWindow
ShowWindow
MessageBoxW
Sections
.text Size: 371KB - Virtual size: 370KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 149KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ