Q:\fjeeVl\omQUjh\fojSck\zhRtiwV.pdb
Static task
static1
Behavioral task
behavioral1
Sample
339707f78702411161ba03cede13804c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
339707f78702411161ba03cede13804c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
339707f78702411161ba03cede13804c_JaffaCakes118
-
Size
214KB
-
MD5
339707f78702411161ba03cede13804c
-
SHA1
a4f9004d609f94831d9594c9220ac33e7e9c867e
-
SHA256
771ffba7d25dde2969fda48ae12b9470d0c85d6ebbcc305c55644dbed71b1729
-
SHA512
7827b878e6028d5da0638b8f121603d7914ef7c99bdd8f6f237a220d2c2bab4bcbb1b51a7e090059c5100e2bdb2e6f05c92ec3a1d13d81176f6a61902cc24469
-
SSDEEP
6144:4LKvGnpk+KGrqz+EfvmwMArzOlD9vxWX7KG:9vGpPZM+EfvTWlD9vkrK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 339707f78702411161ba03cede13804c_JaffaCakes118
Files
-
339707f78702411161ba03cede13804c_JaffaCakes118.exe windows:5 windows x86 arch:x86
7e6e77180d0667c7ca12d0834d7f2615
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
DestroyMenu
GetCursorPos
RegisterWindowMessageA
GetUpdateRect
RedrawWindow
wvsprintfW
OpenIcon
CharToOemW
UnionRect
GetPropW
TranslateAcceleratorW
SetWindowTextW
SetActiveWindow
DialogBoxIndirectParamW
MessageBoxW
CreateAcceleratorTableW
IsCharAlphaNumericW
ShowOwnedPopups
InsertMenuA
LoadImageA
IsWindowUnicode
MessageBoxA
DefDlgProcA
GetShellWindow
DrawIcon
DestroyCaret
DefFrameProcA
GetNextDlgTabItem
kernel32
HeapReAlloc
OpenFileMappingA
OpenEventA
IsValidLanguageGroup
CreateEventW
CopyFileW
MoveFileW
DeviceIoControl
DisconnectNamedPipe
LoadLibraryA
OpenSemaphoreW
GetStartupInfoA
SystemTimeToFileTime
LCMapStringW
LeaveCriticalSection
gdi32
CreateBitmap
StartDocW
CreatePalette
PtInRegion
RestoreDC
ResizePalette
StartPage
GetTextMetricsA
CreatePolygonRgn
GetTextMetricsW
TextOutA
CreateFontIndirectW
PtVisible
ole32
OleUninitialize
OleInitialize
Exports
Exports
?_Y_OH__uhplqjqm_huyop@@YGHPAMD@Z
?JY_Liogoqjfc_dfuO@@YGHIG@Z
?H_VUTdm_oshs_uR_T_U__@@YGDGN@Z
?YKJO_XPSMLj__u@@YGPADMI@Z
?i_l_v_kmbbzsb_gV@@YGEK@Z
?_htra_j__iwa_xvufh@@YGPAIHPAM@Z
?Q_djPKMz____@@YGPAHFG@Z
?osuqzis_whqkfnr@@YGJDD@Z
?XJu_L___@@YGPAEFG@Z
?is_lslKIINw_hno@@YGMIG@Z
?YRZ_ucws__v_clhA_Jvr@@YGPAJPAK@Z
?_J_Huyfoe__y_br@@YGFM@Z
?mf_fgxZP__WJkd_aKny_@@YGPAIJF@Z
?OQQ_WBOEsfzjOQR_@@YGXH@Z
?r_omaZBCi__X_D@@YGEJM@Z
?HDADVudter__u@@YGXPAGJ@Z
?_____WPPWph@@YGMPAG@Z
?E_B_GSA@@YGXGPAF@Z
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mdata Size: 12KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ