D:\bLfOdTAzHrqR\ndirSzQbnIym\pskjhSXSqNobyA.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2cb6b409ab484671572d142543e9d426_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2cb6b409ab484671572d142543e9d426_JaffaCakes118.exe
Resource
win10v2004-20240708-en
General
-
Target
2cb6b409ab484671572d142543e9d426_JaffaCakes118
-
Size
211KB
-
MD5
2cb6b409ab484671572d142543e9d426
-
SHA1
a3fbaf7ebdbe700fab1c4f47d87676c0a93e5ff2
-
SHA256
007b0b032c277d16f2cba39de0f7576ab6d75dc8d7aa5da70a82ce84848c551b
-
SHA512
3f6f92e90059720721bb6533734abee986dbb5a4d5976b7f76d18811a99c9ff46e9b75d6c338ec8f01cb3fc8f58955b4deccd43dae1337eed35bd1ff660f8872
-
SSDEEP
3072:3RupmgGwzWU9fGqrsDiXhJ0+YNFqD1yV5mbgW7d6EUbgM6kB+CmCB2rI/yYgc2O:3RuYpW5TrK9FK1KbWbT6ZBd/yV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2cb6b409ab484671572d142543e9d426_JaffaCakes118
Files
-
2cb6b409ab484671572d142543e9d426_JaffaCakes118.exe windows:5 windows x86 arch:x86
55f72d87c440756322aacb17becae78e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
islower
realloc
_controlfp
wcsncmp
__set_app_type
__p__fmode
__p__commode
_amsg_exit
fseek
_initterm
wcscspn
qsort
wcscpy
_acmdln
setvbuf
exit
fwrite
wcstombs
isspace
strcpy
putchar
gets
strcoll
fgets
_ismbblead
atoi
swscanf
strspn
wcsncpy
vswprintf
_XcptFilter
wcsrchr
_exit
isalpha
vsprintf
fgetc
_cexit
__setusermatherr
wcstok
__getmainargs
gdi32
GetTextExtentPoint32A
GetLayout
SetBkColor
TextOutA
SetTextAlign
CreateBitmap
SetBitmapBits
SetBkMode
SetWindowOrgEx
BitBlt
SetDIBitsToDevice
GetDIBColorTable
GetROP2
StartPage
GetNearestPaletteIndex
GetBitmapBits
CreateEllipticRgnIndirect
GetTextMetricsW
Polygon
GetSystemPaletteUse
EndDoc
SetViewportOrgEx
UnrealizeObject
CreatePatternBrush
SelectObject
CreateHalftonePalette
FlattenPath
SetDIBits
GetTextFaceW
GetCharWidth32W
RestoreDC
Rectangle
DeleteDC
PtVisible
PtInRegion
GetBkMode
user32
GetClassNameW
GetClassInfoA
LoadBitmapA
GetWindowLongA
SetCursor
DefWindowProcW
InflateRect
EnableWindow
EnumWindows
GetFocus
SetWindowLongW
GetClipCursor
SetMenu
MapVirtualKeyExW
PostMessageA
GetMenu
DialogBoxIndirectParamA
GetDlgItemTextW
IsDialogMessageA
DeleteMenu
FindWindowA
SetWindowPos
EnableMenuItem
CreatePopupMenu
MapWindowPoints
ScreenToClient
SystemParametersInfoA
IsWindowEnabled
GetSystemMenu
MapDialogRect
ShowCaret
DrawAnimatedRects
SetPropW
GetWindowTextW
SetWindowTextW
CopyImage
SwapMouseButton
SetDlgItemTextW
DrawStateA
CharPrevW
OemToCharBuffA
GetDlgItemTextA
RemovePropW
GetMenuItemCount
CharNextA
InternalGetWindowText
FindWindowW
SendMessageA
SetActiveWindow
GetWindowLongW
SetFocus
CheckMenuItem
ReplyMessage
GetMenuContextHelpId
UnionRect
CreateWindowExW
DrawMenuBar
IsWindow
DrawStateW
CreateIconIndirect
GetUpdateRect
AppendMenuA
ChangeMenuW
GetSysColorBrush
DestroyWindow
IsDialogMessageW
GetDialogBaseUnits
CharLowerA
SendMessageTimeoutA
PostThreadMessageW
CheckRadioButton
GetScrollPos
GetDlgCtrlID
IsCharLowerA
GetMenuItemRect
DrawTextA
LoadCursorW
ScrollWindowEx
IsWindowVisible
GetKeyboardLayoutList
CharToOemW
GetMenuStringA
DrawEdge
DialogBoxIndirectParamW
ShowWindow
KillTimer
RemoveMenu
FrameRect
kernel32
QueryPerformanceCounter
TlsSetValue
HeapFree
IsBadStringPtrW
GetFileAttributesW
SetThreadPriority
GetFileInformationByHandle
SetFileAttributesA
lstrcatW
GetFileTime
HeapSize
ReleaseSemaphore
SetThreadLocale
GetAtomNameA
SizeofResource
GetFileAttributesA
GetVersionExA
FileTimeToDosDateTime
HeapCreate
GetLastError
SetFilePointer
SetCommState
BuildCommDCBA
GlobalFindAtomW
GlobalGetAtomNameW
SetEndOfFile
WinExec
CreateRemoteThread
EscapeCommFunction
LocalLock
GetSystemWindowsDirectoryW
FormatMessageA
RegisterWaitForSingleObject
DisconnectNamedPipe
SetThreadContext
CompareStringW
IsValidLanguageGroup
RaiseException
MoveFileExA
SetSystemTimeAdjustment
LockResource
VirtualProtect
comctl32
CreateStatusWindowW
InitCommonControlsEx
ImageList_GetIcon
ImageList_Create
CreatePropertySheetPageA
Exports
Exports
?DeleteCriticalSectionDJUkdjJK@@YGKEPA_WG@Z
?DeleteCriticalSectionDUidKJLKljd@@YGKEPA_WG@Z
?DeleteCriticalSectionDUiudIUkljud@@YGKEPA_WG@Z
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dbg_ Size: 75KB - Virtual size: 195KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ