R:\gpUUcUpihJj\tVhtFYAPM\bpHbphqzxxuzvz.pdb
Static task
static1
Behavioral task
behavioral1
Sample
407597e59c5dbfe307f81e65aaeb5fdf_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
407597e59c5dbfe307f81e65aaeb5fdf_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
407597e59c5dbfe307f81e65aaeb5fdf_JaffaCakes118
-
Size
156KB
-
MD5
407597e59c5dbfe307f81e65aaeb5fdf
-
SHA1
a505e3d69579db338bbd72ae1ffcc4bc688c36d2
-
SHA256
cb44c95b1c63968c728ee8164703d650546055ea560a15e0b15d61fa2bb7d291
-
SHA512
273286ab18b0adee96c0991b6dc0ac38b5c298cd736ac54c45cd858cad478474a9e06e6fc569925edae03c4d8d857c8b3f8a756bfe242e3032955f555193ab58
-
SSDEEP
3072:fEaEEfX0iR0ACT9AY0yseEqPHQR/14OQRLrWOyL9aWNFNo8C:cWkIijg4tB29aaNK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 407597e59c5dbfe307f81e65aaeb5fdf_JaffaCakes118
Files
-
407597e59c5dbfe307f81e65aaeb5fdf_JaffaCakes118.exe windows:5 windows x86 arch:x86
dc2f904e64bedc3b055b56af52e3c955
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
IsWindowEnabled
GetClientRect
GetForegroundWindow
SetFocus
OffsetRect
AdjustWindowRect
IsWindow
GetTopWindow
kernel32
GetCompressedFileSizeW
GetFileType
HeapReAlloc
GetVersionExA
GetSystemWindowsDirectoryW
GetShortPathNameW
ReleaseSemaphore
MoveFileA
GetSystemDirectoryW
UnmapViewOfFile
DisconnectNamedPipe
GetCurrentThreadId
CompareFileTime
SetTimerQueueTimer
ntdll
RtlCompareMemory
Exports
Exports
?InsertFil
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fxc Size: - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fx Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ