c:\suqgndohg\hwtimv\qel\eifses.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3ccf14e42a44b060704ccb7dabe6fabc_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3ccf14e42a44b060704ccb7dabe6fabc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3ccf14e42a44b060704ccb7dabe6fabc_JaffaCakes118
-
Size
364KB
-
MD5
3ccf14e42a44b060704ccb7dabe6fabc
-
SHA1
0040cd9ff8ba78e5599bdec3ed4f0aa73a147f78
-
SHA256
4a96d8c01a24d9fc9df8ce27044a064eb067db3916b1d435b423cc2735d1c322
-
SHA512
235fb58c8480d988c539213a3a079ab28e7a0acc037620b1386223a554c5df7883023ee72be32340ec34fdc5ecaf47bb9f9ad962ad3b1c4d3964aac684515126
-
SSDEEP
6144:gqsPrSlRSFHJ5qcUcJ48B1IP6h0XuU5vOrJ:gqs2lKJ5ZUcJ48BmP6SXuU2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ccf14e42a44b060704ccb7dabe6fabc_JaffaCakes118
Files
-
3ccf14e42a44b060704ccb7dabe6fabc_JaffaCakes118.exe windows:4 windows x86 arch:x86
e82c4ee54b5aa34ead5862f586eb485e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetStringTypeA
UnhandledExceptionFilter
VirtualQuery
GetPrivateProfileSectionNamesA
LocalFileTimeToFileTime
FoldStringA
InterlockedExchange
InterlockedDecrement
SystemTimeToTzSpecificLocalTime
SetHandleCount
HeapCreate
GetFileType
SetEnvironmentVariableA
GetACP
EnterCriticalSection
GetModuleHandleA
RtlUnwind
CloseHandle
VirtualFree
LCMapStringA
GlobalFindAtomA
SetConsoleTextAttribute
GetLogicalDriveStringsW
GetTempFileNameA
OpenMutexW
MultiByteToWideChar
LeaveCriticalSection
GetCommandLineA
HeapAlloc
TlsGetValue
GetLocaleInfoW
TlsFree
GetStartupInfoA
GetNumberFormatA
InitializeCriticalSection
VirtualAlloc
GetStdHandle
CreateDirectoryW
CompareStringA
TlsAlloc
CompareStringW
SetCurrentDirectoryW
HeapFree
LoadLibraryA
GetCurrentThread
GetCurrentProcessId
SetFilePointer
GlobalAlloc
SetThreadContext
ReadFile
HeapDestroy
LCMapStringW
GetTickCount
MapViewOfFile
IsBadWritePtr
lstrcpynW
OpenFile
GetPrivateProfileStructW
GetCurrentProcess
HeapReAlloc
GetDiskFreeSpaceA
TerminateProcess
GetVersion
UnlockFile
lstrlenW
WritePrivateProfileStructA
FreeEnvironmentStringsW
GetNamedPipeHandleStateW
GetSystemTimeAsFileTime
RemoveDirectoryA
LoadLibraryExA
FindFirstFileA
GetProcAddress
FreeEnvironmentStringsA
OpenMutexA
QueryPerformanceCounter
GetTimeZoneInformation
CreateMutexA
GetMailslotInfo
WriteFile
InterlockedIncrement
SetStdHandle
GetModuleFileNameA
GetLastError
GetEnvironmentStringsW
GetStringTypeW
CreateFileA
GetSystemInfo
GetOEMCP
GetLocalTime
DeleteCriticalSection
SetConsoleOutputCP
WideCharToMultiByte
TlsSetValue
ExitProcess
EnumResourceNamesW
FlushFileBuffers
SetLastError
GetSystemTime
GetCurrentThreadId
GetEnvironmentStringsA
GetCPInfo
GetEnvironmentStrings
comctl32
InitCommonControlsEx
GetEffectiveClientRect
user32
SendMessageTimeoutW
CharNextA
CreateCaret
MessageBoxExW
ShowWindow
AdjustWindowRect
SetWindowWord
EnumPropsA
RemovePropA
SetUserObjectInformationW
DefMDIChildProcA
RegisterWindowMessageW
GetMenuState
DdeSetUserHandle
DdeGetLastError
DestroyCaret
RegisterClassExA
CharNextW
DrawTextExW
SendNotifyMessageA
GetDlgCtrlID
CreateAcceleratorTableA
ChangeDisplaySettingsExA
GetLastActivePopup
GetClassWord
SetClassLongW
FlashWindow
GetKeyNameTextW
IsChild
CharPrevW
TrackPopupMenu
wvsprintfA
OffsetRect
DefWindowProcA
ClipCursor
EndTask
ImpersonateDdeClientWindow
DefFrameProcA
DestroyWindow
RegisterHotKey
CheckMenuRadioItem
CreateMDIWindowW
MessageBoxExA
CreateIcon
CreateWindowExA
VkKeyScanA
ClientToScreen
SetWindowLongA
OpenInputDesktop
GetUserObjectInformationW
GetScrollBarInfo
PeekMessageA
WindowFromDC
GetInputDesktop
TranslateAcceleratorA
RealGetWindowClass
GetListBoxInfo
CascadeWindows
InvalidateRect
VkKeyScanExA
EnableMenuItem
RegisterClassA
RegisterClipboardFormatW
SendMessageA
WindowFromPoint
UnregisterHotKey
GetClassInfoExA
LoadStringA
CloseClipboard
MessageBoxA
GetMessagePos
CharToOemA
DialogBoxIndirectParamA
Sections
.text Size: 124KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ