Q:\YgQHgoq\xcdgxjorql\xSsujaNR\TcxvscyIitxloM.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3f54cf49a3cdb7e31adb4344c4d9ccc1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3f54cf49a3cdb7e31adb4344c4d9ccc1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3f54cf49a3cdb7e31adb4344c4d9ccc1_JaffaCakes118
-
Size
152KB
-
MD5
3f54cf49a3cdb7e31adb4344c4d9ccc1
-
SHA1
56d1722c2c3b8b43fa655a47f225c95365dd516d
-
SHA256
2a026851bb1823183309280d79d3cd538accf6065e334f6831d2c1bed7f427ee
-
SHA512
1588715102c1118b6d4464cd1d0229eac687678964d55d56a7a6ee83ecaff3608bc734127a548b5df9ee948a225c08b1b13058f18c539aec09e8a56efd8c1a20
-
SSDEEP
3072:UIShlddwUwri6UDFX3h707E/sCoGRyicGmByYKtHn:xUdwUwu6YFOo/siM3s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f54cf49a3cdb7e31adb4344c4d9ccc1_JaffaCakes118
Files
-
3f54cf49a3cdb7e31adb4344c4d9ccc1_JaffaCakes118.exe windows:5 windows x86 arch:x86
c2c93d8bb93bda4ef14cbc071b0b3e55
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
gmtime
mktime
setlocale
mbstowcs
__set_app_type
bsearch
tolower
__p__fmode
__p__commode
wcschr
towupper
clearerr
_amsg_exit
fputs
calloc
wcscpy
iswctype
_initterm
strpbrk
_ismbblead
wcsstr
vsprintf
wcsrchr
mbtowc
wcscspn
wcscmp
floor
remove
fprintf
qsort
strrchr
_XcptFilter
_exit
_cexit
__setusermatherr
wcstombs
wcspbrk
printf
__getmainargs
time
strspn
gets
wcstoul
fgetc
isspace
wcstod
comctl32
ImageList_GetImageCount
ImageList_LoadImageW
ImageList_GetIconSize
ImageList_Destroy
ImageList_Create
ImageList_ReplaceIcon
kernel32
SetErrorMode
GetProcessHeap
SearchPathA
ConvertDefaultLocale
GlobalGetAtomNameW
GetDateFormatW
GetWindowsDirectoryA
GetModuleFileNameW
GetModuleHandleW
GlobalReAlloc
GetModuleFileNameA
GetStartupInfoW
GetFullPathNameW
EnumResourceTypesA
OpenFile
FileTimeToDosDateTime
LocalSize
GetUserDefaultLangID
GetSystemWindowsDirectoryA
GetComputerNameExA
DeleteFileA
ResumeThread
GlobalMemoryStatusEx
FlushViewOfFile
GetOEMCP
GetCompressedFileSizeW
DefineDosDeviceW
GlobalHandle
GetFileInformationByHandle
lstrcpyW
ExitThread
DeleteAtom
GetComputerNameA
CompareStringW
GetAtomNameW
LoadLibraryW
HeapUnlock
GetFileAttributesA
HeapAlloc
MoveFileA
ResetEvent
lstrcmpiW
SetCurrentDirectoryW
RemoveDirectoryA
GetSystemDirectoryA
HeapFree
GetCommState
AreFileApisANSI
SetNamedPipeHandleState
GlobalSize
VirtualProtect
lstrlenW
OpenEventW
GetBinaryTypeW
lstrcmpiA
CloseHandle
OpenFileMappingA
GetCommProperties
user32
TrackPopupMenuEx
BeginDeferWindowPos
InSendMessage
EnumChildWindows
GetAsyncKeyState
GetIconInfo
GetMenuItemInfoW
GetScrollInfo
GetAltTabInfoA
GetUpdateRgn
CopyRect
HiliteMenuItem
CopyAcceleratorTableW
OffsetRect
ReleaseDC
GetClassLongA
DrawStateA
UnloadKeyboardLayout
GetWindowTextW
MapVirtualKeyA
GetKeyboardType
SetWindowRgn
AppendMenuW
ScrollWindow
CharNextA
GetMenuCheckMarkDimensions
MessageBoxA
CreateMenu
SetMenuItemInfoW
IsDialogMessageA
ShowWindowAsync
DefFrameProcW
SetMenu
CharNextW
IsCharAlphaNumericW
GetNextDlgTabItem
GetMenuItemCount
OemToCharBuffA
InSendMessageEx
AttachThreadInput
wsprintfW
LoadCursorA
GetFocus
GetUserObjectInformationA
SendDlgItemMessageW
CreateCaret
InsertMenuA
IsCharAlphaW
GetDC
IsCharLowerA
GetMonitorInfoW
DrawTextW
GetCaretPos
SetParent
wvsprintfW
GetMenu
DrawStateW
mouse_event
CharUpperBuffA
LoadAcceleratorsW
SendInput
GetClassInfoA
IsWindow
SetCaretPos
TrackPopupMenu
ChildWindowFromPointEx
CheckMenuRadioItem
TranslateMessage
GetClassInfoExW
GetMenuStringA
CharPrevW
CharLowerA
SetWindowPlacement
InsertMenuW
CharToOemW
ArrangeIconicWindows
GetSysColor
DispatchMessageW
IsChild
GetScrollRange
LockWindowUpdate
ClipCursor
GetClassNameW
CopyImage
CreateIconIndirect
GetMessageA
GetParent
SendMessageTimeoutW
CallWindowProcW
SendMessageW
SetMenuDefaultItem
EnableWindow
FindWindowExW
GetMenuState
DestroyCaret
SetScrollInfo
KillTimer
AdjustWindowRect
GetDlgItem
LoadBitmapA
RegisterWindowMessageA
DrawTextExW
CharPrevA
SetScrollPos
GetWindowRect
RegisterHotKey
ScrollWindowEx
LoadStringW
EndPaint
CreateCursor
MoveWindow
GetWindowTextA
MonitorFromPoint
SetCursor
GetMenuItemID
GetTopWindow
SetWindowLongA
CharLowerBuffW
IsIconic
Exports
Exports
?TestAccountSecDUoiJDK@@YGKGE[D
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ