f:\saetslgr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2ed6d02e8d7efcb3977b94316697fa7d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2ed6d02e8d7efcb3977b94316697fa7d_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2ed6d02e8d7efcb3977b94316697fa7d_JaffaCakes118
-
Size
631KB
-
MD5
2ed6d02e8d7efcb3977b94316697fa7d
-
SHA1
ebe6c7924d4f39186d0dbcde9111387c603d0c59
-
SHA256
d5280a6de244be2728a7c414d24a6e488d325c2b64ef86de5a46ffbbde34ebfb
-
SHA512
7f2038858330bba68ee3cb65025d60c5edff8b48f482a54aa69ce5ff53ca3b65bc4c4821565e9252559e7a5287dca785730717beafd619f2a9b178c4bc0ad2f9
-
SSDEEP
12288:Z+TUve1N52T8wmAKARvPzdTjRsRdDAC+B4lqt3j4paYA7PguJ5L:+sRINAR1WTZ+qu4MZrbR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ed6d02e8d7efcb3977b94316697fa7d_JaffaCakes118
Files
-
2ed6d02e8d7efcb3977b94316697fa7d_JaffaCakes118.exe windows:4 windows x86 arch:x86
9ab89360de867105fb9380e636864630
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_Remove
ImageList_GetImageInfo
DrawStatusTextA
_TrackMouseEvent
ImageList_BeginDrag
GetEffectiveClientRect
ImageList_SetImageCount
ImageList_EndDrag
CreatePropertySheetPageW
DrawInsert
ImageList_Read
ImageList_LoadImageA
CreatePropertySheetPageA
CreatePropertySheetPage
ImageList_GetBkColor
InitCommonControlsEx
ImageList_SetOverlayImage
ImageList_LoadImageW
ImageList_GetFlags
ImageList_Destroy
ImageList_DrawIndirect
ImageList_GetDragImage
ImageList_Merge
kernel32
GetCommandLineA
VirtualAlloc
SetLastError
UnhandledExceptionFilter
GetVersionExA
GetFileType
SetHandleCount
VirtualProtect
GetEnvironmentStringsW
FlushFileBuffers
GetShortPathNameW
GetCurrentThread
DebugBreak
GetSystemInfo
LeaveCriticalSection
HeapCreate
GetTickCount
TerminateProcess
FreeEnvironmentStringsW
GetProcAddress
GetTimeFormatA
EnumSystemLocalesA
GetOEMCP
MultiByteToWideChar
GetTimeZoneInformation
HeapDestroy
GetCommandLineW
GetDateFormatA
CompareStringA
ExitProcess
GetACP
GetCurrentProcess
TlsFree
IsBadWritePtr
TlsGetValue
HeapReAlloc
IsValidLocale
IsValidCodePage
HeapAlloc
ReadConsoleOutputAttribute
GetLocaleInfoA
InterlockedIncrement
FreeEnvironmentStringsA
VirtualFree
CloseHandle
GetCurrentProcessId
TlsSetValue
GetModuleFileNameA
GetStringTypeW
OutputDebugStringA
GetEnvironmentStrings
DeleteCriticalSection
HeapFree
GetModuleFileNameW
VirtualQuery
IsBadReadPtr
OpenMutexA
GetLastError
GetStartupInfoW
GetCPInfo
SetStdHandle
GetSystemTimeAsFileTime
CreateMutexA
InterlockedDecrement
LCMapStringA
GetModuleHandleA
LCMapStringW
ReadFile
InitializeCriticalSection
QueryPerformanceCounter
WriteFile
HeapValidate
GetStdHandle
LoadLibraryA
SetFilePointer
SetConsoleCtrlHandler
InterlockedExchange
LocalUnlock
EnterCriticalSection
SetEnvironmentVariableA
GetStartupInfoA
GetLocaleInfoW
LocalCompact
TlsAlloc
GetStringTypeA
GetUserDefaultLCID
CompareStringW
RtlUnwind
GetCurrentThreadId
WideCharToMultiByte
advapi32
RegQueryValueExA
RegLoadKeyW
CryptSetProviderExW
gdi32
CreateDIBitmap
Polyline
GetTextCharsetInfo
LineDDA
CreateSolidBrush
PolyPolygon
comdlg32
PageSetupDlgW
user32
GetPropW
RemovePropW
CharToOemA
DrawCaption
DdeDisconnect
RegisterClassA
MoveWindow
DefWindowProcW
DefWindowProcA
CreateWindowExA
EndDialog
SetClipboardViewer
DestroyWindow
GetDCEx
InsertMenuItemA
RegisterClassExA
UpdateWindow
ShowWindow
MessageBoxW
Sections
.text Size: 371KB - Virtual size: 370KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 158KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ