C:\OEUEFES\JXBEEUMQHE\EGSNOTSCB.PDB
Static task
static1
Behavioral task
behavioral1
Sample
2b3616b2058d1aab0d12fc828261a244_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b3616b2058d1aab0d12fc828261a244_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2b3616b2058d1aab0d12fc828261a244_JaffaCakes118
-
Size
612KB
-
MD5
2b3616b2058d1aab0d12fc828261a244
-
SHA1
97ff454f3af3cfc03f16dda47238c7754d32b12b
-
SHA256
119e83b03d8353157d9f5686ed98df04408aa7a6720f536bd081c2dd3772cfd9
-
SHA512
d09dd408bf1175616ff36c9f1e8b2c056cb162215c5b5567c58018d06a7d989c388c5adb7a33cc0a681c3e3cd7dac63e02021b2bc9aecd169146a0c4c79ef38b
-
SSDEEP
12288:3c5o116EEIXqopefEAnx9Qq8cgM5SWH6qoP5gylgRLDUyAX/V2jR:sU1/EIv0fEAnbQnm5ojpKiNX/wjR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b3616b2058d1aab0d12fc828261a244_JaffaCakes118
Files
-
2b3616b2058d1aab0d12fc828261a244_JaffaCakes118.exe windows:4 windows x86 arch:x86
d40a3b96ec063fe9ff7ec5301219bfd7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
DuplicateToken
LookupPrivilegeValueW
CryptImportKey
CryptSetKeyParam
CryptGetKeyParam
CryptEncrypt
CreateServiceA
RegConnectRegistryA
LookupAccountSidW
LogonUserA
CryptGetHashParam
AbortSystemShutdownW
CryptGenKey
CryptCreateHash
CryptSetHashParam
DuplicateTokenEx
CryptSetProviderExA
CreateServiceW
LookupAccountNameA
RegDeleteKeyA
CryptVerifySignatureW
RegOpenKeyExA
CryptEnumProvidersW
CryptDeriveKey
wininet
DeleteUrlCacheContainerA
comctl32
ImageList_AddMasked
ImageList_EndDrag
CreatePropertySheetPageA
InitCommonControlsEx
ImageList_LoadImageA
ImageList_SetImageCount
CreateUpDownControl
user32
SetCapture
WindowFromPoint
CreateWindowExA
GetWindowRect
GetUserObjectInformationW
OemToCharW
DestroyWindow
EnumDisplaySettingsW
ShowWindowAsync
DdeCreateDataHandle
FindWindowW
GetMenuItemRect
AdjustWindowRectEx
GetTopWindow
CascadeChildWindows
RegisterClipboardFormatW
GetWindowTextW
ToAsciiEx
CreateMenu
IsCharAlphaNumericW
LoadCursorFromFileA
CreateWindowExW
LoadStringA
GetMenuItemInfoA
FlashWindow
CallWindowProcW
DrawIcon
GetClipCursor
MsgWaitForMultipleObjects
LoadAcceleratorsA
GetPriorityClipboardFormat
InternalGetWindowText
LookupIconIdFromDirectoryEx
DdePostAdvise
GetKeyState
GetClipboardOwner
ShowWindow
SetForegroundWindow
CharNextA
EnumDesktopsW
EnumDesktopWindows
EnableScrollBar
ChildWindowFromPoint
SystemParametersInfoW
GetMenuItemInfoW
CharLowerW
SetFocus
LoadCursorW
MapVirtualKeyW
MessageBoxA
LoadCursorFromFileW
SetWindowTextA
GetInputState
UnregisterClassA
PostMessageA
SetUserObjectInformationW
GetOpenClipboardWindow
GetDesktopWindow
DrawIconEx
GetWindowContextHelpId
VkKeyScanExW
RegisterClassA
RemovePropA
DeferWindowPos
ModifyMenuA
WaitMessage
MapVirtualKeyA
RegisterDeviceNotificationA
DdeSetUserHandle
ExcludeUpdateRgn
DrawStateW
CharToOemBuffA
LoadBitmapA
RegisterClipboardFormatA
DdeImpersonateClient
SetMenuDefaultItem
IsRectEmpty
TrackMouseEvent
OpenWindowStationW
EnumPropsW
WINNLSEnableIME
DrawCaption
DefWindowProcW
CreateMDIWindowW
DlgDirListW
DdeDisconnect
IsZoomed
DispatchMessageW
SetDoubleClickTime
IsDialogMessageA
SetWindowsHookA
DrawFrameControl
MapVirtualKeyExA
RegisterClassExA
SetScrollRange
GetSysColor
EnumDisplayMonitors
WinHelpA
SetWindowWord
OffsetRect
DdeAccessData
EndPaint
DdeQueryConvInfo
shell32
FreeIconList
kernel32
TlsAlloc
GetCurrentProcessId
GetStringTypeA
GetLongPathNameA
WriteConsoleA
CompareStringA
MultiByteToWideChar
SetEnvironmentVariableA
EnumSystemLocalesA
FindResourceW
GetModuleHandleA
CompareStringW
GetStdHandle
GetOEMCP
GetProfileSectionA
OpenMutexA
EnumDateFormatsW
EnumDateFormatsExW
SetFileTime
HeapSize
CreateFileA
CloseHandle
CreateDirectoryW
FileTimeToSystemTime
GetCompressedFileSizeW
MoveFileExW
GetLocaleInfoW
HeapCreate
LCMapStringW
GetProfileStringW
GetStringTypeW
HeapFree
SetThreadContext
SetEnvironmentVariableW
GetCurrentThread
WriteFile
GetLastError
RemoveDirectoryA
LoadLibraryExW
WriteConsoleOutputA
GetLocaleInfoA
DeleteCriticalSection
EnumDateFormatsExA
SuspendThread
LocalAlloc
GetConsoleCP
RemoveDirectoryW
InterlockedDecrement
GetDateFormatW
SetFilePointer
GlobalDeleteAtom
WriteConsoleOutputW
GetProcessHeap
HeapDestroy
GetConsoleOutputCP
CreateMutexA
FreeLibraryAndExitThread
GetSystemInfo
SetLastError
GetProfileStringA
GetConsoleScreenBufferInfo
TlsSetValue
TlsGetValue
CreateDirectoryExW
GetFileType
WideCharToMultiByte
LCMapStringA
SetConsoleCtrlHandler
lstrcpynW
IsValidCodePage
GetFileAttributesExA
GetStartupInfoW
FindResourceA
HeapLock
ReleaseMutex
HeapAlloc
GetProcAddress
AddAtomA
SetUnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
VirtualAlloc
EnterCriticalSection
QueryPerformanceCounter
GetEnvironmentStringsW
InterlockedExchange
HeapReAlloc
lstrcmpiA
EnumResourceTypesW
GetACP
WriteConsoleOutputCharacterW
IsValidLocale
FlushInstructionCache
GetUserDefaultLCID
GetCurrentProcess
LoadLibraryExA
GetCurrentThreadId
GetSystemTimeAdjustment
CreateToolhelp32Snapshot
OpenEventW
GetCommandLineA
GetCurrencyFormatW
ReadFile
DebugActiveProcess
GetCPInfo
TerminateProcess
Sleep
DeleteFiber
GetStartupInfoA
GetPrivateProfileStringW
FindFirstFileExW
GlobalReAlloc
SetHandleCount
UnmapViewOfFile
IsDebuggerPresent
GetTimeZoneInformation
FlushViewOfFile
GetStringTypeExA
GetTickCount
SetStdHandle
TlsFree
VirtualQuery
WriteConsoleW
lstrcatW
InterlockedIncrement
LeaveCriticalSection
GetSystemTimeAsFileTime
GetProcessAffinityMask
GetTempFileNameA
GetConsoleMode
IsBadWritePtr
LoadLibraryA
GetModuleFileNameA
FreeLibrary
FlushFileBuffers
RtlUnwind
GetEnvironmentStrings
GetComputerNameW
VirtualProtectEx
VirtualFree
WaitForSingleObjectEx
WriteProfileStringW
GetTimeFormatA
ExitProcess
GetCurrencyFormatA
GetDateFormatA
InitializeCriticalSection
lstrcpynA
lstrcmpW
OpenSemaphoreW
LockFileEx
UnhandledExceptionFilter
GetVersionExA
comdlg32
GetOpenFileNameW
Sections
.text Size: 188KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 262KB - Virtual size: 262KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 109KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ