c:\diedojo\lvgngopf.PDB
Static task
static1
Behavioral task
behavioral1
Sample
4111b06b9fd295ae0315e2b1112c97e4_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4111b06b9fd295ae0315e2b1112c97e4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4111b06b9fd295ae0315e2b1112c97e4_JaffaCakes118
-
Size
440KB
-
MD5
4111b06b9fd295ae0315e2b1112c97e4
-
SHA1
20ebc6450b94ef06bd96935792e60982497582ca
-
SHA256
b7adbac7a41571469d97a7ab386b63f7b00d3b7deea78f418074c6d4cda8eaa8
-
SHA512
287fad7626cb37070edfca15306c467df5f69ef476dba35dfba7d3ac9d40f87961d4e6a1eefa1a6c1792333c17be84fbbba08f8711923462110e386f19770f9b
-
SSDEEP
6144:aHDimv4JOogb9u5OPysnrMMPGGmN/S3sXlwd+SrHVmBQMLJfJEUdiYkThym:ajd4JOdkkPywrMRNAs8rHVmBh3iv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4111b06b9fd295ae0315e2b1112c97e4_JaffaCakes118
Files
-
4111b06b9fd295ae0315e2b1112c97e4_JaffaCakes118.exe windows:4 windows x86 arch:x86
f24d8de1f8315e69ec5f0fd69b5f25d3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_GetIconSize
ImageList_DragLeave
_TrackMouseEvent
ImageList_SetOverlayImage
ImageList_Read
CreateToolbar
ImageList_Add
DrawStatusTextA
DrawStatusTextW
ImageList_Destroy
CreateToolbarEx
ImageList_AddMasked
ImageList_LoadImageW
ImageList_SetFilter
ImageList_GetBkColor
ImageList_SetIconSize
ImageList_EndDrag
ImageList_ReplaceIcon
ImageList_Merge
MakeDragList
CreatePropertySheetPageW
ImageList_Write
InitCommonControlsEx
ImageList_DragShowNolock
ImageList_GetImageRect
GetEffectiveClientRect
kernel32
GetConsoleMode
WriteConsoleW
GetOEMCP
GetProcessHeap
GetCommandLineA
TlsSetValue
CloseHandle
GetSystemTimeAsFileTime
OutputDebugStringA
SetStdHandle
IsValidLocale
GetTimeZoneInformation
GetLastError
HeapValidate
GetStdHandle
UnhandledExceptionFilter
IsBadReadPtr
WriteFile
DebugBreak
GetCurrentProcessId
LeaveCriticalSection
CompareStringA
GetTickCount
OpenMutexA
HeapFree
GetLocaleInfoW
SetFilePointer
GetProcAddress
HeapAlloc
GetDateFormatA
LoadLibraryA
TlsFree
LCMapStringW
FreeLibrary
TlsGetValue
GetModuleHandleA
GetUserDefaultLCID
MultiByteToWideChar
GetCurrentThreadId
GetEnvironmentStrings
HeapCreate
InterlockedIncrement
GetCurrentProcess
CreateMutexA
HeapReAlloc
QueryPerformanceCounter
SetConsoleCtrlHandler
ReadFile
HeapDestroy
SetHandleCount
VirtualFree
InterlockedDecrement
lstrlenA
EnumSystemLocalesA
GetACP
TlsAlloc
EnterCriticalSection
FreeEnvironmentStringsW
ExitProcess
WriteConsoleA
InterlockedExchange
GetFileType
FlushFileBuffers
GetConsoleOutputCP
SetEnvironmentVariableA
DeleteCriticalSection
IsValidCodePage
GetModuleFileNameA
LoadLibraryW
GetStringTypeA
RtlUnwind
GetEnvironmentStringsW
GetCPInfo
GetCurrentThread
VirtualAlloc
GetVersionExA
TerminateProcess
CreateFileA
GetConsoleCP
FreeEnvironmentStringsA
WideCharToMultiByte
SetLastError
SetUnhandledExceptionFilter
IsDebuggerPresent
GetTimeFormatA
GetModuleFileNameW
InitializeCriticalSection
GetStartupInfoA
GetStringTypeW
CompareStringW
LCMapStringA
RaiseException
VirtualQuery
GetLocaleInfoA
OutputDebugStringW
user32
LoadMenuIndirectA
LoadCursorW
CheckDlgButton
IsClipboardFormatAvailable
MessageBoxW
SetUserObjectSecurity
SwitchToThisWindow
DdeCreateDataHandle
AppendMenuW
CreateWindowExW
GetMenuBarInfo
GetGuiResources
IntersectRect
DestroyWindow
DefWindowProcA
RegisterClassExA
ShowWindow
RegisterClassA
GetCaretBlinkTime
wvsprintfW
GetPropW
GetMessageExtraInfo
CharToOemW
Sections
.text Size: 216KB - Virtual size: 213KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ