S:\nykHsIdFcJg\bnkZthpBX\tJlrIeB.pdb
Static task
static1
Behavioral task
behavioral1
Sample
37c3a5293eaab5e8063afb55c98e11af_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
37c3a5293eaab5e8063afb55c98e11af_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
37c3a5293eaab5e8063afb55c98e11af_JaffaCakes118
-
Size
146KB
-
MD5
37c3a5293eaab5e8063afb55c98e11af
-
SHA1
0e09df0dc8b51dacbb26e370f6a33450fcd0f63f
-
SHA256
a75f7ad810ebcebcd2b3873175a3c609dda97ac4aea1e73f31a78492209594b3
-
SHA512
a0105374399a10a6ec153c9a8c53d07f7d264405dca316d67bb6386a6acb1bccd3826e1a53003851997e818950cedfba5dfb0afa52517769d166e1924e86fd60
-
SSDEEP
3072:TbRa5b3T9pFpesdKnsfoTz9sQRSk2E2FIr6dDT8wUdw:TEb5MsdKnskNpH2PT8Fd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 37c3a5293eaab5e8063afb55c98e11af_JaffaCakes118
Files
-
37c3a5293eaab5e8063afb55c98e11af_JaffaCakes118.exe windows:5 windows x86 arch:x86
db032a6c260933c85dcb23a0157c458b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
StrToIntW
msvcrt
swprintf
_controlfp
setlocale
fgets
floor
strcoll
iswspace
strncmp
isxdigit
__set_app_type
__p__fmode
__p__commode
qsort
toupper
getc
puts
_amsg_exit
strerror
_initterm
_ismbblead
realloc
rand
fgetc
_XcptFilter
wcstoul
_exit
iswxdigit
putchar
strrchr
clearerr
_cexit
iswprint
__setusermatherr
strspn
bsearch
strcpy
isalnum
srand
__getmainargs
wcscspn
mbstowcs
islower
localtime
strtoul
fclose
fseek
strpbrk
kernel32
SetPriorityClass
GlobalGetAtomNameA
MulDiv
GetShortPathNameA
ReleaseMutex
OpenEventA
lstrlenA
SetThreadAffinityMask
MoveFileW
SetSystemTime
CreateFileMappingW
GetFullPathNameW
WriteFile
GetCurrentThreadId
GetFileSize
CompareFileTime
GetThreadTimes
GetWindowsDirectoryA
GetComputerNameExW
PulseEvent
FindResourceExA
GetStartupInfoA
GetUserDefaultUILanguage
SetMailslotInfo
ConvertDefaultLocale
GetStartupInfoW
lstrcmpiA
VirtualProtect
SetEvent
DeleteCriticalSection
FindResourceExW
FindClose
ResetEvent
GetTimeZoneInformation
SetFilePointer
IsBadStringPtrW
UnlockFile
TlsFree
IsDBCSLeadByteEx
CreateEventW
GetLongPathNameW
EnumResourceNamesW
EnumSystemLocalesA
GetOEMCP
CreateNamedPipeA
HeapSize
FormatMessageW
GetTempPathA
LoadLibraryA
DeleteFileA
CallNamedPipeW
GetCommProperties
GetLocaleInfoW
SetHandleCount
GetModuleHandleA
user32
IsDialogMessageA
IsWindowUnicode
EnumChildWindows
RegisterClassExA
SetForegroundWindow
SetDlgItemTextA
FindWindowExA
ShowCaret
CharLowerBuffW
IsChild
SetWindowTextW
CheckMenuItem
CharUpperBuffW
CharToOemW
wsprintfA
LoadBitmapW
LoadIconW
SetRectEmpty
MapVirtualKeyW
GetForegroundWindow
CreateAcceleratorTableW
CharToOemA
ActivateKeyboardLayout
LoadIconA
GetKeyboardLayoutList
MoveWindow
DrawEdge
SystemParametersInfoA
LoadImageW
GetSysColor
IsWindow
RedrawWindow
GetMenuState
DrawTextA
HiliteMenuItem
DrawFocusRect
GetDlgCtrlID
IsCharAlphaNumericW
UnionRect
GetDlgItemTextA
IsIconic
GetDlgItem
InSendMessageEx
LoadMenuW
GetWindowTextA
TranslateAcceleratorA
IsDlgButtonChecked
DeleteMenu
GetMenuStringW
CheckMenuRadioItem
ReplyMessage
SendMessageTimeoutW
DefDlgProcW
SendMessageW
DestroyCaret
GetSystemMetrics
LockWindowUpdate
LoadCursorW
OffsetRect
WaitMessage
ScrollWindowEx
GetWindowPlacement
CallWindowProcA
GetIconInfo
DefFrameProcA
GetUpdateRgn
GetScrollPos
CharUpperW
DrawTextExW
IsDialogMessageW
EnableWindow
CharToOemBuffA
DeferWindowPos
DefFrameProcW
GetMessagePos
MonitorFromPoint
SetCursorPos
GetAsyncKeyState
DrawAnimatedRects
MessageBoxExW
GetPropW
IsCharAlphaW
SetMenuItemBitmaps
PostMessageA
CreateDialogParamA
EnumWindows
DispatchMessageW
ChildWindowFromPointEx
SetRect
SetDlgItemTextW
CharUpperA
FrameRect
SetCaretPos
DrawStateA
SendMessageTimeoutA
GetKeyboardType
SetUserObjectInformationW
LoadAcceleratorsW
IsZoomed
TabbedTextOutW
CreateIconIndirect
DestroyIcon
OemToCharBuffA
InvalidateRgn
MapDialogRect
SetClassLongW
GetDoubleClickTime
ToUnicodeEx
PeekMessageA
SetCursor
EnumThreadWindows
CallWindowProcW
CreatePopupMenu
wvsprintfA
SendNotifyMessageW
ShowWindow
GetUserObjectInformationA
GetClientRect
CopyImage
KillTimer
Exports
Exports
?GetShiftAltInfo@@YGK_KHE:O
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bit Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.insec Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.inmin Size: 512B - Virtual size: 86B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wall Size: 512B - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ