Q:\zqKwxdkdAjrw\tAyqrqxahKezju\yNyvxoVirDEev\eZlNGpoWIc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
30de2569404eac955f90cd8448177059_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
30de2569404eac955f90cd8448177059_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
30de2569404eac955f90cd8448177059_JaffaCakes118
-
Size
221KB
-
MD5
30de2569404eac955f90cd8448177059
-
SHA1
41b421e772d26671afcb52cbc5b4686f6c2623e6
-
SHA256
ddd542e4d30b2b94686a9799d758cb0a8cc8b412b83eeca4fd1b65c203bd85d1
-
SHA512
97a3c8b28496001a9e456d20f30c666d7bf04779a59422d17ba97e4fd65591bac1697703e7bdcc9f712049f13ff089f13e9a2ad03010ce6a70253563dae45b78
-
SSDEEP
6144:vCKPvJ6ZUA7GkNRek2iDMs5FlJF7iNgu5PiQlt:vDXJiR3DpX7iJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30de2569404eac955f90cd8448177059_JaffaCakes118
Files
-
30de2569404eac955f90cd8448177059_JaffaCakes118.exe windows:5 windows x86 arch:x86
0955788bb2968ff48114810239403bbf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
DrawMenuBar
GetForegroundWindow
AdjustWindowRect
PostThreadMessageA
SetDlgItemTextA
GetClipCursor
SendMessageTimeoutW
GetDialogBaseUnits
LoadImageW
GetDCEx
CopyImage
LoadCursorW
CheckMenuRadioItem
GetAltTabInfoW
ShowOwnedPopups
CharNextW
TrackPopupMenuEx
CreateDialogIndirectParamW
TabbedTextOutW
IsWindowUnicode
IsWindowVisible
GetKeyboardLayoutList
DeferWindowPos
ScrollWindow
ShowCaret
LoadBitmapW
CreateWindowExA
RegisterClassA
MessageBoxExW
DestroyAcceleratorTable
ScrollWindowEx
ScreenToClient
IsRectEmpty
SetDlgItemInt
MessageBoxExA
GetMenuItemRect
msvcrt
memcpy
comdlg32
ReplaceTextW
PrintDlgExW
ChooseFontW
ChooseColorW
PrintDlgW
version
VerQueryValueW
kernel32
InitializeCriticalSection
GetFileAttributesExA
IsBadWritePtr
SetThreadExecutionState
DisconnectNamedPipe
LocalUnlock
LocalReAlloc
HeapUnlock
CreateThread
TerminateThread
SetLocalTime
CompareStringA
UnlockFile
GetStartupInfoA
ReadFile
GetComputerNameExW
LoadLibraryW
gdi32
SetDIBits
EndPage
GetMapMode
CreateEllipticRgnIndirect
OffsetViewportOrgEx
CreateFontIndirectA
CreatePatternBrush
DPtoLP
OffsetRgn
CreateFontA
CreateBitmap
PatBlt
GetTextExtentPointW
Escape
LineTo
SetStretchBltMode
comctl32
ImageList_ReplaceIcon
DestroyPropertySheetPage
CreatePropertySheetPageW
ImageList_Read
ImageList_Create
ole32
OleIsRunning
Exports
Exports
?SDOisioKJS@@YGKEPA_WG@Z
Sections
.text Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dat_0 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_1 Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dat_2 Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_3 Size: 512B - Virtual size: 353B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_4 Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.debug Size: 512B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ