k:\dqnwe\rrsowgz.pdb
Static task
static1
Behavioral task
behavioral1
Sample
40fd922b0a548803b60d8cd75272f6ed_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
40fd922b0a548803b60d8cd75272f6ed_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
40fd922b0a548803b60d8cd75272f6ed_JaffaCakes118
-
Size
501KB
-
MD5
40fd922b0a548803b60d8cd75272f6ed
-
SHA1
0845c6a0eaa0139cdb906362d1a60da04faeba3c
-
SHA256
c5f1751aa143ca54267b9e48276f146352430326a260ab5abe9ed3b50e4e7331
-
SHA512
9b181ac92c1617acef162c252fc06e10532b41923e6cb2f208bc83c7119d21134d32d9c1b607f1a2beb15abfa124b00e4e44f1c00656c763f0a2650f6e090151
-
SSDEEP
12288:6QIuSgFe803wM3hLA+7/rYQhG5q1rdQQEQCG6QVbcZ1O615GDu0o:6r9gE803wM3hLA+7/k4Gk1rdQtQCG6W5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40fd922b0a548803b60d8cd75272f6ed_JaffaCakes118
Files
-
40fd922b0a548803b60d8cd75272f6ed_JaffaCakes118.exe windows:4 windows x86 arch:x86
b701762b1c39e6aabcfee52f43f8041f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetConnectW
DeleteUrlCacheGroup
DeleteUrlCacheEntryW
FtpDeleteFileA
HttpAddRequestHeadersW
IsUrlCacheEntryExpiredA
HttpCheckDavCompliance
GopherGetLocatorTypeW
gdi32
SetGraphicsMode
shell32
CheckEscapesW
SHGetInstanceExplorer
SheChangeDirExW
SHFileOperationA
kernel32
SetCurrentDirectoryW
GetTickCount
GetConsoleMode
GetCPInfo
SetConsoleCtrlHandler
QueryPerformanceCounter
FreeEnvironmentStringsA
InitializeCriticalSectionAndSpinCount
SetHandleCount
CreateFileA
HeapFree
LCMapStringA
FreeEnvironmentStringsW
DeleteCriticalSection
GetStringTypeA
HeapAlloc
GetEnvironmentStringsW
SetEnvironmentVariableA
GetEnvironmentStrings
GetTimeZoneInformation
UnhandledExceptionFilter
GetConsoleCP
GetLastError
GetTimeFormatA
GetSystemTimeAsFileTime
HeapReAlloc
GetLocaleInfoA
TlsSetValue
WaitCommEvent
ExitProcess
InterlockedIncrement
GetLocaleInfoW
FlushFileBuffers
GetFileType
RtlUnwind
SetStdHandle
IsValidLocale
OpenMutexA
GetCurrentProcessId
WriteConsoleA
InterlockedExchange
DuplicateHandle
FreeLibrary
CloseHandle
GetCommandLineA
GetStringTypeW
WideCharToMultiByte
GetModuleFileNameA
HeapCreate
SetLastError
CompareStringW
GetNamedPipeHandleStateW
GetACP
GetCurrentProcess
GetCurrentThreadId
GlobalUnfix
LoadLibraryA
IsDebuggerPresent
TlsGetValue
GetModuleHandleA
EnumSystemLocalesA
VirtualAlloc
GetUserDefaultLCID
TerminateProcess
IsValidCodePage
GlobalGetAtomNameA
TlsFree
MultiByteToWideChar
WriteConsoleW
SetUnhandledExceptionFilter
GetConsoleOutputCP
WriteFile
HeapDestroy
SetFilePointer
ReadFile
GetOEMCP
LeaveCriticalSection
VirtualQuery
TlsAlloc
GetProcAddress
VirtualFree
CompareStringA
HeapSize
GetDateFormatA
EnterCriticalSection
LCMapStringW
Sleep
GetCurrentThread
GetStdHandle
GetProfileIntA
GetStartupInfoA
GetModuleHandleW
CreateMutexA
InterlockedDecrement
comctl32
InitCommonControlsEx
user32
RegisterClassA
IntersectRect
SetTimer
GetOpenClipboardWindow
ModifyMenuW
InvertRect
RegisterClassExA
GetMessageA
CharLowerW
DdeAccessData
GetClipCursor
GetClassInfoExW
DispatchMessageW
DefFrameProcA
DrawStateW
SetUserObjectInformationW
Sections
.text Size: 355KB - Virtual size: 355KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ