c:\qwvmknne\ghz\eqen\zvodefjcmu\eetrfe\whewjp.PDB
Static task
static1
Behavioral task
behavioral1
Sample
2a66c544d04680f49a5b7ab4682b81e8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2a66c544d04680f49a5b7ab4682b81e8_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2a66c544d04680f49a5b7ab4682b81e8_JaffaCakes118
-
Size
513KB
-
MD5
2a66c544d04680f49a5b7ab4682b81e8
-
SHA1
7175bfbff422821179b253974bafb552f1e819c6
-
SHA256
36eec2d8f9ba203545e7e9c9cadc0045ceb0ef1a1da448a96b47ee6aff5297d4
-
SHA512
9c53319f50515d80f8f8ebac8194dbe30a255ec1cc29b50c56fdb2172df32db3f304c47098b6f9b31e03e7fde748ab2d3a60f207e08a2b6d48d11880905f3f22
-
SSDEEP
12288:fylOdEAKpcbp/FMmnvlktdoiux0sCVaVYxeJNTOL:qlOdEqNrni/l20sCVyYxe3yL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a66c544d04680f49a5b7ab4682b81e8_JaffaCakes118
Files
-
2a66c544d04680f49a5b7ab4682b81e8_JaffaCakes118.exe windows:4 windows x86 arch:x86
2563f72c9aee7c351fc0ff7c841a5e23
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
ShellExecuteW
FreeIconList
comdlg32
GetSaveFileNameW
ReplaceTextA
PageSetupDlgW
ChooseColorA
wininet
SetUrlCacheEntryInfoA
comctl32
ImageList_SetDragCursorImage
InitCommonControlsEx
ImageList_SetOverlayImage
CreateStatusWindowA
ImageList_Duplicate
ImageList_DragLeave
ImageList_Create
ImageList_DrawIndirect
CreateStatusWindow
ImageList_Remove
ImageList_SetBkColor
ImageList_SetImageCount
ImageList_GetImageRect
kernel32
VirtualAlloc
LCMapStringW
GetCurrentThreadId
WriteFile
CreateMutexA
TerminateProcess
SetFilePointer
LocalAlloc
SetConsoleTextAttribute
InitializeCriticalSection
GetThreadLocale
InterlockedExchange
HeapCreate
LCMapStringA
GlobalAlloc
GetCurrencyFormatW
FreeEnvironmentStringsW
GetProcAddress
GetSystemTime
SetStdHandle
GetOEMCP
GetTickCount
EnumDateFormatsW
DeleteCriticalSection
GetFileType
InterlockedIncrement
IsBadWritePtr
GetModuleFileNameA
TlsSetValue
lstrcmpiW
VirtualFree
EnumSystemLocalesA
GetCurrentProcessId
FileTimeToDosDateTime
GetEnvironmentStrings
SetSystemTime
GetLastError
GetStringTypeW
WideCharToMultiByte
CloseHandle
GetCommandLineW
GetCommandLineA
SetHandleCount
CompareStringA
GetVersion
GetACP
GetCPInfo
FindResourceA
UnhandledExceptionFilter
VirtualQuery
LeaveCriticalSection
FreeEnvironmentStringsA
LoadLibraryA
SetLastError
FindFirstFileExA
SetEnvironmentVariableA
GetStartupInfoA
GetStringTypeA
ReadFile
MultiByteToWideChar
ResumeThread
GetModuleHandleA
EnterCriticalSection
SetTimeZoneInformation
HeapLock
GetEnvironmentStringsW
HeapDestroy
TlsAlloc
OpenMutexA
GetLocalTime
HeapReAlloc
CompareStringW
TlsGetValue
GlobalSize
lstrcmpW
GetTimeZoneInformation
QueryPerformanceCounter
HeapFree
InterlockedDecrement
GetStdHandle
GetSystemTimeAsFileTime
GetCurrentThread
TlsFree
RtlUnwind
ExitProcess
GetCurrentProcess
HeapAlloc
FlushFileBuffers
WaitForMultipleObjects
user32
DefWindowProcA
RegisterClassExA
CreateWindowExW
SetWindowsHookW
LoadImageW
MessageBoxW
RegisterClassA
GetMenu
LookupIconIdFromDirectory
GetWindowPlacement
DestroyWindow
MessageBoxIndirectW
ShowWindow
gdi32
EnumFontsW
GetObjectW
SelectObject
CreateDCA
DeleteDC
DeleteObject
FloodFill
GetDeviceCaps
Sections
.text Size: 135KB - Virtual size: 134KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 244KB - Virtual size: 275KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ