T:\hLLxMndyVwmF\qwroogaMoxwWLC\yvRxstWk\DtpJhuxZ.pdb
Static task
static1
Behavioral task
behavioral1
Sample
39c9331a15b303237f4bc86549a8130b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
39c9331a15b303237f4bc86549a8130b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
39c9331a15b303237f4bc86549a8130b_JaffaCakes118
-
Size
149KB
-
MD5
39c9331a15b303237f4bc86549a8130b
-
SHA1
c6aacb25d0ec6776de46c86cafcd35614ce13898
-
SHA256
75dd9bb234cde957d07192dce844a2f31cd42515d79e148a8bc568a80337d6cc
-
SHA512
23ebb76d4d5fe8bd7df0bef0867f0258acd80805d6b93b021851e5cb6fcd6b5ee77b2d3d645af1c9cdf42e39be62df947cacd99ce134b94fb9e7b998c4e423bd
-
SSDEEP
3072:SYWo21wEcgGV/x1QPjM5jEeml9BduGA72dXITk:Co2wVbQ7SEPl9BdnBg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39c9331a15b303237f4bc86549a8130b_JaffaCakes118
Files
-
39c9331a15b303237f4bc86549a8130b_JaffaCakes118.exe windows:5 windows x86 arch:x86
44b2e49366570f92131a707ff7e78684
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_Draw
ImageList_Destroy
CreateStatusWindowW
ImageList_LoadImageW
ImageList_Create
ImageList_GetImageCount
msvcrt
remove
_controlfp
vswprintf
fprintf
__set_app_type
realloc
wcslen
__p__fmode
putc
ungetc
__p__commode
strrchr
ftell
wcstol
srand
qsort
isdigit
time
fwrite
fread
gmtime
free
strncpy
wcscmp
_amsg_exit
_initterm
malloc
wcscoll
fgetc
clearerr
_ismbblead
_XcptFilter
strerror
localtime
swprintf
rand
_exit
_cexit
sscanf
__setusermatherr
wcscat
swscanf
isupper
clock
wcscspn
__getmainargs
setvbuf
shlwapi
StrToIntW
kernel32
EnumSystemLocalesA
GetCommandLineA
CreateWaitableTimerW
InitializeCriticalSection
MoveFileExW
GetComputerNameA
FindNextChangeNotification
CreateEventW
WaitForMultipleObjectsEx
FindResourceExA
GetComputerNameExW
CopyFileW
TransactNamedPipe
LoadResource
HeapWalk
GetExitCodeThread
WinExec
DefineDosDeviceW
EscapeCommFunction
CreateThread
FileTimeToLocalFileTime
GetShortPathNameW
GetCurrentDirectoryW
CreateMailslotW
TlsSetValue
ResumeThread
FindNextFileA
MoveFileW
SetUnhandledExceptionFilter
LockFile
ClearCommError
GlobalSize
CreateFileA
CreateFileMappingA
LoadLibraryA
MoveFileA
TryEnterCriticalSection
CreateSemaphoreW
GetOEMCP
WriteFile
ClearCommBreak
CompareFileTime
GlobalCompact
SetEvent
CreateDirectoryA
CopyFileA
GetFileAttributesExW
CreateNamedPipeA
RemoveDirectoryA
CreateWaitableTimerA
ReadFile
VerifyVersionInfoW
GetDateFormatA
IsDBCSLeadByte
SetThreadPriority
user32
DestroyCaret
CreateCursor
LoadImageW
SetPropW
CallWindowProcA
KillTimer
SetCursorPos
SendMessageW
GetSystemMenu
ScrollWindowEx
LoadBitmapA
TranslateMessage
SetActiveWindow
LoadMenuW
EnumThreadWindows
DrawAnimatedRects
ValidateRect
SendInput
AppendMenuA
SetWindowPlacement
UnloadKeyboardLayout
GetWindowLongW
GetActiveWindow
DeferWindowPos
GetNextDlgTabItem
IsCharLowerA
SystemParametersInfoW
GetMenuItemRect
GetFocus
CharUpperW
EnumWindows
RemovePropW
DrawFocusRect
GetScrollRange
SendDlgItemMessageA
RegisterHotKey
GetMenuItemCount
SendMessageTimeoutA
EnumChildWindows
SetScrollPos
RegisterWindowMessageW
MonitorFromPoint
VkKeyScanW
ScrollWindow
IsZoomed
CheckMenuRadioItem
MessageBoxA
SetCursor
keybd_event
CharPrevA
CharLowerBuffW
SetParent
GetKeyState
DrawFrameControl
InternalGetWindowText
TranslateAcceleratorA
CharPrevW
DrawMenuBar
GetSystemMetrics
CharLowerW
SetDlgItemTextW
SetDlgItemInt
GetClassNameW
FindWindowExW
GetSysColor
IsWindow
FrameRect
SetClassLongW
GetDialogBaseUnits
GetUserObjectInformationA
SetDlgItemTextA
CopyRect
OemToCharBuffA
LoadStringA
CreateCaret
InsertMenuW
GetParent
BeginDeferWindowPos
RegisterWindowMessageA
GetNextDlgGroupItem
MapVirtualKeyExW
SetWindowLongA
GetWindowTextW
AdjustWindowRectEx
SystemParametersInfoA
GetDlgItemTextA
SetWindowTextA
ChildWindowFromPointEx
MapDialogRect
SetWindowRgn
LoadMenuA
EqualRect
MapVirtualKeyA
GetUpdateRgn
ReplyMessage
EndPaint
GetWindowLongA
GetMessageW
PostMessageA
GetDoubleClickTime
GetWindowPlacement
SetTimer
IsWindowUnicode
FindWindowW
ExitWindowsEx
RemoveMenu
GetDC
SetMenuDefaultItem
AttachThreadInput
RegisterClassA
PeekMessageA
GetMessagePos
ClipCursor
CreateWindowExA
EnableWindow
CloseDesktop
SetMenuItemBitmaps
Exports
Exports
?Extract_Options@@YGK_KHE:O
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 134B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.feed Size: 1024B - Virtual size: 640B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ