e:\nredpoof\jimai\ujeihty\hzzkeedvx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3256211085ebc2b502d1afb99b782726_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3256211085ebc2b502d1afb99b782726_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3256211085ebc2b502d1afb99b782726_JaffaCakes118
-
Size
652KB
-
MD5
3256211085ebc2b502d1afb99b782726
-
SHA1
7f651aba008d164aa38dc5294244c76d971623b4
-
SHA256
50f1a1c64be565b31613be2d1e303593a186ae99f05d012aff20b893531c87e5
-
SHA512
0b5d7ff2fb3c433202b07115fc6d065bd58b04da126db490fa0a948af1d9725160a9a5da6d3bdd33e17dcde238ba4bd77e42e5e441229401eedde1e14d0ab92c
-
SSDEEP
12288:qmK0Rbvtoyvkoao3m9s/ndjWMspW5Wsq+S645Kr7j:JhcKWyd0WUsnS645I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3256211085ebc2b502d1afb99b782726_JaffaCakes118
Files
-
3256211085ebc2b502d1afb99b782726_JaffaCakes118.exe windows:4 windows x86 arch:x86
c64a66e59fa1c38fb088d8c640f40f21
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
FlashWindowEx
PostQuitMessage
BlockInput
GetTitleBarInfo
SendNotifyMessageW
DdeFreeStringHandle
CreateIconIndirect
CreateWindowExA
SetWindowRgn
PeekMessageW
FreeDDElParam
CreateDialogParamW
CheckRadioButton
RegisterClassExA
EnumDisplayDevicesA
ShowScrollBar
RegisterClassA
WINNLSGetIMEHotkey
InvalidateRgn
DefWindowProcA
SetScrollRange
EnumDisplaySettingsA
EnableScrollBar
SetDoubleClickTime
MessageBoxW
DestroyWindow
SendMessageW
SetMessageQueue
DdeCreateStringHandleA
wvsprintfW
BroadcastSystemMessageA
CharToOemW
IsRectEmpty
ShowWindow
comctl32
DrawStatusTextW
InitCommonControlsEx
ImageList_Add
ImageList_GetImageInfo
kernel32
SetEnvironmentVariableA
QueryPerformanceCounter
OpenEventA
SetConsoleMode
OpenMutexA
HeapReAlloc
TlsAlloc
EnumSystemLocalesA
GetNamedPipeHandleStateW
GetStringTypeA
SetLastError
ReadFile
IsValidCodePage
FreeEnvironmentStringsA
HeapSize
VirtualAlloc
GetCurrentThread
TerminateProcess
GetEnvironmentStringsW
Sleep
GetModuleHandleW
DeleteCriticalSection
GetTickCount
FormatMessageA
WriteFile
HeapDestroy
WaitForSingleObject
GetTimeZoneInformation
SetConsoleCtrlHandler
CompareStringW
SetCurrentDirectoryA
FlushFileBuffers
GetLastError
GetLocaleInfoA
LoadLibraryExA
GetCurrentProcess
GetConsoleCP
RtlUnwind
GetTimeFormatA
TlsFree
HeapAlloc
GetModuleHandleA
GetModuleFileNameA
WriteConsoleW
GetSystemTimeAsFileTime
CloseHandle
TlsSetValue
CompareStringA
InterlockedExchange
GetStringTypeW
LCMapStringA
GlobalFree
MultiByteToWideChar
CreateMutexA
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
GetFileType
HeapLock
GlobalUnlock
ExitProcess
IsDebuggerPresent
GetConsoleMode
GetProcessHeap
GetCurrentProcessId
GetCPInfo
CreateToolhelp32Snapshot
VirtualFree
GetACP
TlsGetValue
UnhandledExceptionFilter
EnterCriticalSection
LoadLibraryA
LCMapStringW
HeapCreate
SetStdHandle
VirtualQuery
InterlockedIncrement
GetProcAddress
SetConsoleTitleW
EnumDateFormatsW
GetCommandLineA
IsValidLocale
GetEnvironmentStrings
FreeEnvironmentStringsW
GetConsoleOutputCP
lstrcmpiW
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleA
FreeLibrary
CreateFileA
WideCharToMultiByte
CreateDirectoryExW
SetHandleCount
GetOEMCP
GetStartupInfoA
FindFirstFileExW
SetFilePointer
GetThreadSelectorEntry
GetUserDefaultLCID
GetPrivateProfileIntA
InterlockedDecrement
HeapFree
GetStdHandle
GetStringTypeExW
ConnectNamedPipe
OpenFile
GetDateFormatA
Sections
.text Size: 220KB - Virtual size: 216KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 264KB - Virtual size: 263KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ