f:\saetslgr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2c6c203c1f0b4a460c6e79167e643bd7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2c6c203c1f0b4a460c6e79167e643bd7_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2c6c203c1f0b4a460c6e79167e643bd7_JaffaCakes118
-
Size
590KB
-
MD5
2c6c203c1f0b4a460c6e79167e643bd7
-
SHA1
5b48d47168c7441bf9cf940d031c17963a81e690
-
SHA256
74215903557c6d43d84577352ef16efa5b753d1b70b078b43276c1521e3b9acb
-
SHA512
01d6ea96a495a9775a0c9089487eb5c5181b42cd9583389b6a3dbd8562a4711fcc550fcd0bd40d9c59339e99cbdcf2350bc608a6a1fa812e5fcf19a10eeff081
-
SSDEEP
12288:O+TUve1N52T8wmAKARvPzdTjRsRdDAC+B4lqt3j4paYA7PguJYR:rsRINAR1WTZ+qu4MZrbYR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c6c203c1f0b4a460c6e79167e643bd7_JaffaCakes118
Files
-
2c6c203c1f0b4a460c6e79167e643bd7_JaffaCakes118.exe windows:4 windows x86 arch:x86
9ab89360de867105fb9380e636864630
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_Remove
ImageList_GetImageInfo
DrawStatusTextA
_TrackMouseEvent
ImageList_BeginDrag
GetEffectiveClientRect
ImageList_SetImageCount
ImageList_EndDrag
CreatePropertySheetPageW
DrawInsert
ImageList_Read
ImageList_LoadImageA
CreatePropertySheetPageA
CreatePropertySheetPage
ImageList_GetBkColor
InitCommonControlsEx
ImageList_SetOverlayImage
ImageList_LoadImageW
ImageList_GetFlags
ImageList_Destroy
ImageList_DrawIndirect
ImageList_GetDragImage
ImageList_Merge
kernel32
GetCommandLineA
VirtualAlloc
SetLastError
UnhandledExceptionFilter
GetVersionExA
GetFileType
SetHandleCount
VirtualProtect
GetEnvironmentStringsW
FlushFileBuffers
GetShortPathNameW
GetCurrentThread
DebugBreak
GetSystemInfo
LeaveCriticalSection
HeapCreate
GetTickCount
TerminateProcess
FreeEnvironmentStringsW
GetProcAddress
GetTimeFormatA
EnumSystemLocalesA
GetOEMCP
MultiByteToWideChar
GetTimeZoneInformation
HeapDestroy
GetCommandLineW
GetDateFormatA
CompareStringA
ExitProcess
GetACP
GetCurrentProcess
TlsFree
IsBadWritePtr
TlsGetValue
HeapReAlloc
IsValidLocale
IsValidCodePage
HeapAlloc
ReadConsoleOutputAttribute
GetLocaleInfoA
InterlockedIncrement
FreeEnvironmentStringsA
VirtualFree
CloseHandle
GetCurrentProcessId
TlsSetValue
GetModuleFileNameA
GetStringTypeW
OutputDebugStringA
GetEnvironmentStrings
DeleteCriticalSection
HeapFree
GetModuleFileNameW
VirtualQuery
IsBadReadPtr
OpenMutexA
GetLastError
GetStartupInfoW
GetCPInfo
SetStdHandle
GetSystemTimeAsFileTime
CreateMutexA
InterlockedDecrement
LCMapStringA
GetModuleHandleA
LCMapStringW
ReadFile
InitializeCriticalSection
QueryPerformanceCounter
WriteFile
HeapValidate
GetStdHandle
LoadLibraryA
SetFilePointer
SetConsoleCtrlHandler
InterlockedExchange
LocalUnlock
EnterCriticalSection
SetEnvironmentVariableA
GetStartupInfoA
GetLocaleInfoW
LocalCompact
TlsAlloc
GetStringTypeA
GetUserDefaultLCID
CompareStringW
RtlUnwind
GetCurrentThreadId
WideCharToMultiByte
advapi32
RegQueryValueExA
RegLoadKeyW
CryptSetProviderExW
gdi32
CreateDIBitmap
Polyline
GetTextCharsetInfo
LineDDA
CreateSolidBrush
PolyPolygon
comdlg32
PageSetupDlgW
user32
GetPropW
RemovePropW
CharToOemA
DrawCaption
DdeDisconnect
RegisterClassA
MoveWindow
DefWindowProcW
DefWindowProcA
CreateWindowExA
EndDialog
SetClipboardViewer
DestroyWindow
GetDCEx
InsertMenuItemA
RegisterClassExA
UpdateWindow
ShowWindow
MessageBoxW
Sections
.text Size: 371KB - Virtual size: 370KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ