m:\yigtgji\eueowcw.pdb
Static task
static1
Behavioral task
behavioral1
Sample
32abb734e66bb645aac7f857a26d25af_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
32abb734e66bb645aac7f857a26d25af_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
32abb734e66bb645aac7f857a26d25af_JaffaCakes118
-
Size
522KB
-
MD5
32abb734e66bb645aac7f857a26d25af
-
SHA1
fa3be0d345c344c532665b8f0717b6d58b6cb3bb
-
SHA256
89ee1a81e63cc4fef9baf63f6aef410812230ef0c928dd166da9fe5d8c23c127
-
SHA512
74e135aec981b8615d4bcec045d4ec7cbc1bfde47b79ca42767f3992381e20f7d742003c8be75e321ee4b419be24e904d5f0d4619f9911b38cf5562e1c96d40f
-
SSDEEP
6144:4Ajmr9z+fSXeRdcZ+ypvmTfAfjPnv1CKQSJvYjLZky+3/GiGKLdEHEgZ1eE/X0wC:4infS6dMMs718qvIZG+P6DbsXx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 32abb734e66bb645aac7f857a26d25af_JaffaCakes118
Files
-
32abb734e66bb645aac7f857a26d25af_JaffaCakes118.exe windows:4 windows x86 arch:x86
d4619e2b291b0ed474372eef6c31c32f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
IsValidCodePage
InterlockedExchange
SetHandleCount
InterlockedDecrement
GetConsoleOutputCP
GetProcAddress
GetVersionExA
GetFileType
WideCharToMultiByte
GetProcessHeap
GetTimeFormatA
TlsAlloc
GetConsoleMode
LCMapStringW
GetStringTypeA
VirtualQuery
GetStringTypeW
ReadFile
TlsGetValue
CloseHandle
VirtualFree
EnumSystemLocalesA
CreateMutexA
FindResourceExA
HeapReAlloc
ExitProcess
IsDebuggerPresent
GetSystemTimeAsFileTime
WriteConsoleW
HeapFree
GetEnvironmentStringsW
TerminateProcess
GetModuleFileNameA
GetModuleHandleA
SetStdHandle
GetDateFormatA
GetCurrentProcess
DeleteCriticalSection
SetConsoleCtrlHandler
FreeEnvironmentStringsA
GetCurrentProcessId
QueryPerformanceCounter
TlsSetValue
GetStartupInfoA
GlobalAlloc
CreateMailslotW
Sleep
WriteFile
WriteConsoleA
OpenMutexA
GetCurrentThread
SetLastError
FreeEnvironmentStringsW
FlushFileBuffers
EnterCriticalSection
SetFilePointer
GetPrivateProfileStringA
HeapDestroy
LoadLibraryA
CompareStringW
GetCurrentThreadId
MultiByteToWideChar
CreateFileA
GetTimeZoneInformation
HeapCreate
GetCPInfo
InterlockedIncrement
GetStdHandle
GetConsoleCP
RtlUnwind
UnhandledExceptionFilter
GetUserDefaultLCID
GetEnvironmentStrings
InitializeCriticalSection
LocalShrink
SetUnhandledExceptionFilter
CompareStringA
GetOEMCP
VirtualAlloc
LCMapStringA
FreeLibrary
GetLocaleInfoA
GetACP
GetTickCount
HeapSize
SetEnvironmentVariableA
HeapAlloc
IsValidLocale
TlsFree
GetCommandLineA
GetCurrentDirectoryW
LeaveCriticalSection
GetLastError
GetLocaleInfoW
user32
MessageBoxW
RegisterClassA
ShowWindow
PostThreadMessageW
CascadeChildWindows
DrawFocusRect
OffsetRect
LoadIconA
RemovePropW
SwitchDesktop
CheckMenuRadioItem
PtInRect
GetDlgItemTextW
CreateWindowExW
RegisterClassExA
OemToCharW
gdi32
GetTextMetricsW
EndDoc
ExtTextOutW
Ellipse
GdiGetBatchLimit
GetCharABCWidthsA
GetAspectRatioFilterEx
CreateFontIndirectA
GetEnhMetaFileDescriptionW
GdiPlayDCScript
CreateDCA
GetRegionData
Rectangle
GetPixelFormat
CreateCompatibleDC
GetColorAdjustment
GetBkColor
SetICMProfileW
SetICMMode
GetCharWidthFloatW
comctl32
InitCommonControlsEx
Sections
.text Size: 313KB - Virtual size: 313KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ