R:\dEbhNsYoesdfyU\uyidowdgywtdP\zsByxLySlul.pdb
Static task
static1
Behavioral task
behavioral1
Sample
37844ba13b1faaeff8d6efa7995a017f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
37844ba13b1faaeff8d6efa7995a017f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
37844ba13b1faaeff8d6efa7995a017f_JaffaCakes118
-
Size
140KB
-
MD5
37844ba13b1faaeff8d6efa7995a017f
-
SHA1
a92411fff8e71fc32a82a1314049b5bb5da25366
-
SHA256
7df483a18c325aee1fe3f3329cea73879b60c5cc757f88552503fbe50e778ee7
-
SHA512
70f1680a4e635be21fd3b6a46488919a78f0a868fa9ea24292beadae4fae7f460cdfb3e3ca16b757cd3e1679835629323beaba812fde250722a49c6ddf625c5b
-
SSDEEP
3072:VSPT81CyghqQiHmtPw2ZB4WJWCFOJmTFtLt9dBhY6B2jh:wbwg8Qpt7ZHWCsEFtW6Uj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 37844ba13b1faaeff8d6efa7995a017f_JaffaCakes118
Files
-
37844ba13b1faaeff8d6efa7995a017f_JaffaCakes118.exe windows:5 windows x86 arch:x86
d871e8f86d7ffe94f5dac2625bf3b9cc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathIsUNCA
msvcrt
qsort
_controlfp
__set_app_type
fclose
fread
iswspace
malloc
ungetc
wcspbrk
__p__fmode
__p__commode
isdigit
_amsg_exit
setvbuf
wcslen
atol
strpbrk
toupper
strchr
strstr
strcoll
_initterm
memset
towlower
_ismbblead
isupper
mbstowcs
perror
_XcptFilter
putc
fgetc
fflush
wcstod
wcstombs
getenv
free
_exit
wcscpy
wcsncpy
strrchr
strcspn
fseek
putchar
iswalpha
strcpy
_cexit
__setusermatherr
iswxdigit
__getmainargs
comctl32
CreatePropertySheetPageW
DestroyPropertySheetPage
ImageList_Remove
CreatePropertySheetPageA
ImageList_AddMasked
ImageList_ReplaceIcon
user32
GetDlgItemTextW
RegisterClassW
KillTimer
CreateWindowExA
MonitorFromRect
LoadCursorW
IsRectEmpty
ReplyMessage
CopyImage
DrawEdge
SendNotifyMessageW
MessageBoxA
GetIconInfo
CreateDialogParamA
DefDlgProcA
CharToOemBuffA
CreateCaret
GetAsyncKeyState
GetWindowRect
ShowCaret
SetMenuItemInfoW
DrawFrameControl
TileWindows
SetPropW
GetMenuItemRect
InSendMessage
EnableWindow
SetWindowTextA
DestroyIcon
IntersectRect
CharNextA
WaitForInputIdle
AdjustWindowRect
DestroyCaret
TrackPopupMenu
RegisterClassA
ChildWindowFromPointEx
ValidateRect
GetKeyboardType
FillRect
DialogBoxParamW
DefFrameProcA
IsWindowVisible
IsChild
CharPrevA
EndPaint
TabbedTextOutW
LoadImageW
SendMessageW
LoadMenuA
UnionRect
RemoveMenu
GrayStringW
SetScrollRange
CallWindowProcA
ShowCursor
OemToCharA
VkKeyScanW
GetForegroundWindow
InternalGetWindowText
GetLastActivePopup
SwitchToThisWindow
ChangeMenuW
MapVirtualKeyA
TranslateAcceleratorA
IsWindowEnabled
GetMessagePos
IsMenu
SetDlgItemTextA
GetKeyNameTextW
ScrollWindowEx
LoadMenuW
wsprintfA
RegisterClassExA
DrawIconEx
WaitMessage
FrameRect
SendMessageTimeoutW
CreateDialogIndirectParamW
CharUpperBuffA
MessageBoxExW
wvsprintfA
GetMenuStringA
DrawIcon
CharUpperA
HiliteMenuItem
GetKeyState
GetCursorPos
GetClassInfoExW
SetScrollPos
EnumWindows
MessageBoxW
GetUpdateRect
CopyAcceleratorTableW
PostMessageW
CheckMenuRadioItem
GetMenuItemID
RegisterHotKey
WindowFromPoint
MessageBoxExA
CharUpperW
RegisterWindowMessageW
FindWindowExW
ShowScrollBar
OpenDesktopW
LoadAcceleratorsA
CheckRadioButton
SetWindowLongW
PostThreadMessageA
SetRect
LoadCursorA
FindWindowW
GetTopWindow
OemToCharBuffA
InvertRect
EnumThreadWindows
keybd_event
GetSubMenu
kernel32
LCMapStringA
VirtualQuery
lstrcpynA
EnumSystemLocalesA
EnumResourceNamesA
SetEndOfFile
DeleteCriticalSection
GetFileType
SetThreadPriority
HeapUnlock
GetSystemDefaultLangID
GetTimeFormatA
GetTempFileNameA
MoveFileA
GetFileInformationByHandle
RemoveDirectoryW
GetDateFormatA
CancelIo
lstrcpynW
TryEnterCriticalSection
GlobalAddAtomA
GetBinaryTypeW
WaitForSingleObjectEx
GetCommModemStatus
HeapReAlloc
GetFileAttributesW
SleepEx
FindNextFileW
GetFileAttributesExW
GlobalReAlloc
GetCommConfig
QueryDosDeviceW
CreateNamedPipeA
WriteFile
VirtualFree
GetThreadContext
GetLocalTime
IsValidLanguageGroup
GetStartupInfoW
GetSystemWindowsDirectoryW
OpenFileMappingA
MoveFileW
lstrcpyA
CreateFileMappingA
ReadFile
GetWindowsDirectoryA
GetNumberFormatA
GetBinaryTypeA
lstrcmpiW
FindResourceExA
DeleteFileA
GetTickCount
GetShortPathNameA
GetStringTypeExW
lstrcmpiA
Exports
Exports
?ForwardControlItem@@YGK_KK:O
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ips1 Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ips2 Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.read Size: 1024B - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ips3 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ips4 Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ