I:\ozfvwqPj\SxsrdAyzn\abvhLyyy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2d51b421dd1ee9047a6b36be9828bb46_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2d51b421dd1ee9047a6b36be9828bb46_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2d51b421dd1ee9047a6b36be9828bb46_JaffaCakes118
-
Size
61KB
-
MD5
2d51b421dd1ee9047a6b36be9828bb46
-
SHA1
50374c85484ca004ffdd5b5fc9fe3a14d9fd31d0
-
SHA256
ac5838f9aaee0d5de668c82425e4a7e4b858f20f2df509418c8617c90dc24ee7
-
SHA512
ddc50e6b8b727986a8e41db4c3c2e4280fc30543c48edd12a95611eaf8595da0889f4faa1d6e9152e1ec735b74cea243f143e569197eb7a4f05047d575d75175
-
SSDEEP
768:d0uk6GhyknN3p8OYmK1AsnuEGzPSUBcTZcYcgYkTg33YxBf4/V2+NJF8nZ7:dp6AkdxYmK1AsupFOT3Y5Ynj+Nm1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d51b421dd1ee9047a6b36be9828bb46_JaffaCakes118
Files
-
2d51b421dd1ee9047a6b36be9828bb46_JaffaCakes118.exe windows:5 windows x86 arch:x86
1432a5c75298dd842a38c168e4ee243d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
UrlGetPartA
user32
MapVirtualKeyW
IsWindow
AppendMenuA
DestroyMenu
GetActiveWindow
GetIconInfo
ShowCursor
LoadMenuA
CharLowerA
UpdateWindow
SendMessageTimeoutA
CreateDialogParamA
GetMenu
AdjustWindowRect
GetDlgCtrlID
IntersectRect
SendInput
TranslateMessage
ReplyMessage
CreatePopupMenu
LoadIconA
CopyAcceleratorTableW
ModifyMenuW
IsCharAlphaNumericW
SetCursorPos
SetTimer
GetUpdateRgn
GetCaretPos
MessageBoxA
GetWindow
ShowWindowAsync
GetSubMenu
GetUserObjectInformationW
GetMenuItemID
SetSysColors
LoadCursorA
VkKeyScanW
FindWindowExA
SendNotifyMessageW
CreateCaret
IsDialogMessageW
LoadMenuW
GetKeyboardLayoutNameW
EndPaint
GetClassInfoW
SendMessageA
SystemParametersInfoW
GetShellWindow
LoadAcceleratorsW
GetDlgItemTextW
SetWindowPos
GetDC
DialogBoxParamW
EqualRect
EnableScrollBar
GetNextDlgGroupItem
IsRectEmpty
ChildWindowFromPoint
GetLastActivePopup
CharLowerW
PostQuitMessage
GetMonitorInfoW
IsWindowEnabled
AllowSetForegroundWindow
CharPrevW
LoadAcceleratorsA
GetClassInfoA
SetDlgItemTextW
CharLowerBuffW
FindWindowA
GetPropW
SetWindowTextA
SetWindowLongW
SwitchToThisWindow
IsIconic
GetKeyboardLayout
TranslateAcceleratorW
SetWindowLongA
GetForegroundWindow
TrackPopupMenuEx
ActivateKeyboardLayout
DrawFocusRect
PeekMessageA
PostMessageW
SetPropW
IsCharAlphaA
ShowWindow
RegisterClassA
SetMenuDefaultItem
IsChild
CheckDlgButton
CheckRadioButton
RegisterWindowMessageA
CloseDesktop
DrawFrameControl
LoadBitmapW
DeferWindowPos
wsprintfW
GetClassInfoExW
CreateDialogIndirectParamW
EnumChildWindows
MessageBoxExA
WaitMessage
GrayStringW
GetWindowTextLengthW
GetAsyncKeyState
UnloadKeyboardLayout
TrackPopupMenu
LoadIconW
CharUpperBuffW
ClientToScreen
InsertMenuW
wvsprintfW
GetKeyState
GetScrollInfo
SetFocus
DefFrameProcA
SetScrollInfo
RemoveMenu
GetCursorPos
FindWindowExW
SetScrollPos
kernel32
GetTempPathA
GetNumberFormatA
GetLocalTime
GetDateFormatA
SetFileAttributesA
lstrlenW
QueryDosDeviceW
GetFileSize
LocalAlloc
SetUnhandledExceptionFilter
AreFileApisANSI
GetTimeZoneInformation
VerifyVersionInfoW
SetSystemTimeAdjustment
lstrcpyA
SetFileAttributesW
GetModuleFileNameA
SetPriorityClass
IsBadStringPtrW
GetModuleHandleA
CreateSemaphoreW
OpenEventW
GetThreadTimes
WinExec
HeapFree
CreateFileW
GetComputerNameExA
DeviceIoControl
CreateRemoteThread
GlobalUnlock
WriteFile
IsValidLanguageGroup
TransactNamedPipe
ConvertDefaultLocale
lstrlenA
CreateMailslotW
SetHandleInformation
OpenFileMappingW
GetFullPathNameA
GlobalGetAtomNameW
CompareStringW
CloseHandle
RemoveDirectoryA
LeaveCriticalSection
GetLongPathNameW
GlobalAlloc
SetCommTimeouts
CreateWaitableTimerA
MoveFileA
Sleep
OpenFileMappingA
TlsSetValue
SetThreadContext
SetTimerQueueTimer
ResetEvent
ReleaseMutex
DuplicateHandle
msvcrt
setvbuf
malloc
_controlfp
__set_app_type
perror
puts
fclose
__p__fmode
sscanf
fputc
iswspace
strtol
__p__commode
isupper
wcslen
remove
vswprintf
iswdigit
swprintf
_amsg_exit
wcstombs
getenv
_initterm
strcpy
_ismbblead
iswctype
_XcptFilter
isprint
fputs
_exit
_cexit
strcspn
floor
strchr
fgetc
vsprintf
mbstowcs
__setusermatherr
ungetc
swscanf
islower
iswalpha
__getmainargs
exit
isdigit
putc
wcsstr
Exports
Exports
?RedirectOutputMsg@@YGKPBDDKPAX:O
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.cexp Size: 512B - Virtual size: 95B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.regs Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.citab Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.$dbug Size: 512B - Virtual size: 87B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.lime Size: 512B - Virtual size: 364B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tdat Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ