f:\dooorey\msw\cqqot\oypss.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2ece532ac000ace349d9eb815ff2d119_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2ece532ac000ace349d9eb815ff2d119_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2ece532ac000ace349d9eb815ff2d119_JaffaCakes118
-
Size
535KB
-
MD5
2ece532ac000ace349d9eb815ff2d119
-
SHA1
8671f2a9a12930f3bc8d3da95f18ade301d1f10d
-
SHA256
bcec0515926abac15fb7beafba5fb2d19634aef1b1f44ff14cfb191718f2452d
-
SHA512
0e91d54cbe8f85b6a2acf03afc7052be71a4fa87994251080b2856c24a9ec5a8f03204ab479e15dc6eaa629a7d76e01129af83de2e1778481da3ec895f1902ca
-
SSDEEP
12288:zCgZ6YoZJnjpsB6v8o0LF3bCvPX5SKKIyeX3ECM9E:zv41vnjuw8N4nZZy8s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ece532ac000ace349d9eb815ff2d119_JaffaCakes118
Files
-
2ece532ac000ace349d9eb815ff2d119_JaffaCakes118.exe windows:4 windows x86 arch:x86
22a0bc1837e894eff0f951707b2bf553
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryA
GetLocaleInfoA
SetConsoleWindowInfo
VirtualFree
GetOEMCP
TlsFree
WriteConsoleA
CompareStringW
MultiByteToWideChar
FreeLibrary
CloseHandle
ReadFile
QueryPerformanceCounter
SetConsoleCtrlHandler
CreateMutexA
HeapSize
GetProfileStringA
GetProcAddress
GetStringTypeW
GetDateFormatA
TlsSetValue
SetUnhandledExceptionFilter
Sleep
GetStringTypeA
WriteFile
WriteConsoleW
WideCharToMultiByte
CompareStringA
TlsAlloc
LeaveCriticalSection
HeapFree
GetCurrentThreadId
GetStartupInfoA
InterlockedDecrement
GetCommandLineA
SetHandleCount
GetModuleFileNameA
IsValidLocale
GetCPInfo
TerminateProcess
VirtualAlloc
GetUserDefaultLCID
GetCurrentThread
HeapAlloc
IsDebuggerPresent
ExitProcess
HeapCreate
GetACP
EnumSystemLocalesA
GetEnvironmentStringsW
InterlockedIncrement
GetVersionExA
GetLastError
InterlockedExchange
GetStartupInfoW
CreateFileA
GetTimeFormatA
FreeEnvironmentStringsW
SetLastError
UnhandledExceptionFilter
DeleteCriticalSection
GetModuleHandleA
ReleaseMutex
GetEnvironmentStrings
InitializeCriticalSection
RtlUnwind
GetConsoleOutputCP
GetCurrentProcess
SetFilePointer
GetCurrentProcessId
VirtualUnlock
HeapDestroy
SetStdHandle
GetTickCount
IsValidCodePage
GetStdHandle
TlsGetValue
GetSystemTimeAsFileTime
GetProcessHeap
GetConsoleCP
EnterCriticalSection
FreeEnvironmentStringsA
OpenMutexA
LCMapStringA
VirtualQuery
GetTimeZoneInformation
GetLocaleInfoW
LCMapStringW
SetEnvironmentVariableA
FlushFileBuffers
GetFileType
GetConsoleMode
HeapReAlloc
comctl32
InitCommonControlsEx
ImageList_Remove
ImageList_GetImageRect
CreateStatusWindow
ImageList_GetIcon
CreateStatusWindowW
ImageList_EndDrag
CreatePropertySheetPage
_TrackMouseEvent
GetEffectiveClientRect
ImageList_DrawIndirect
ImageList_GetDragImage
ImageList_SetDragCursorImage
ImageList_Merge
ImageList_GetBkColor
ImageList_GetImageCount
ImageList_AddIcon
ImageList_GetFlags
CreateUpDownControl
ImageList_AddMasked
ImageList_DragShowNolock
ImageList_SetImageCount
ImageList_DrawEx
user32
DdeCreateStringHandleA
BringWindowToTop
TranslateMessage
IsWindowUnicode
CreateWindowExW
SetDlgItemTextW
ShowWindow
DefWindowProcA
DdeSetQualityOfService
TabbedTextOutW
RegisterClassA
EnumDesktopsA
LoadIconA
MessageBoxA
RegisterClassExA
GetWindowPlacement
DlgDirListW
SetWindowWord
DestroyWindow
UnpackDDElParam
CreateAcceleratorTableW
GetClassInfoExA
MessageBoxExW
DrawAnimatedRects
Sections
.text Size: 201KB - Virtual size: 201KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 203KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ