f:\kbtyb.pdb
Static task
static1
Behavioral task
behavioral1
Sample
416b3c4b91714a62984aef582f9d036f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
416b3c4b91714a62984aef582f9d036f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
416b3c4b91714a62984aef582f9d036f_JaffaCakes118
-
Size
550KB
-
MD5
416b3c4b91714a62984aef582f9d036f
-
SHA1
468bf983e5950cb608c50d741592599412f2ca47
-
SHA256
55483af0a65f870308d3471ccefce60762e8af398ba443b80ee593f89eda777e
-
SHA512
e86c3e646a17e087307893caa388ccdeb39b23479775386a76d54e643da27db266f726734cbd809e005ccba74971313e833aa278e8fadfd9b0d25db18018d52b
-
SSDEEP
6144:HK8WHR2NmwIK2U4F+UK3DNiLDg1krFnQGLWXqcD3kIVEd/FvNLlnB1wGFNO9RbUN:HE7wP2J+JcA1k0FtuFhn4bLUG2ucKM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 416b3c4b91714a62984aef582f9d036f_JaffaCakes118
Files
-
416b3c4b91714a62984aef582f9d036f_JaffaCakes118.exe windows:4 windows x86 arch:x86
b312fa2be900b3f1d49f7ddf965e94e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
GetDlgCtrlID
CharToOemBuffA
EmptyClipboard
CreateAcceleratorTableA
SystemParametersInfoW
DdeQueryStringW
DdeUninitialize
ScreenToClient
ArrangeIconicWindows
RegisterClassExA
GetAncestor
DrawStateA
GetWindowDC
CharToOemW
EnumDesktopWindows
GetQueueStatus
FindWindowA
EditWndProc
IsCharAlphaW
GetMessageW
CharPrevExA
EnumWindowStationsW
RegisterClassA
EnumDesktopsA
DrawIcon
comctl32
CreatePropertySheetPageW
ImageList_Duplicate
InitCommonControlsEx
CreateToolbarEx
ImageList_ReplaceIcon
ImageList_GetDragImage
kernel32
CreateMutexA
GetModuleHandleA
FlushFileBuffers
GetFileAttributesA
GetSystemTimeAsFileTime
GetEnvironmentStringsW
GetStartupInfoA
InitializeCriticalSection
WideCharToMultiByte
UnhandledExceptionFilter
GlobalFindAtomA
MapViewOfFileEx
lstrcmpiW
GetThreadContext
ReadConsoleInputA
GetStdHandle
LCMapStringW
GetModuleFileNameW
LCMapStringA
TlsFree
HeapCreate
SetFileTime
GetStringTypeA
OpenMutexA
GetLocalTime
HeapSize
GetCommandLineW
GetCPInfo
GetCurrentProcessId
VirtualAlloc
CloseHandle
VirtualProtectEx
UnmapViewOfFile
SetFilePointer
HeapAlloc
GetTimeZoneInformation
GetLastError
CompareStringW
LoadLibraryA
VirtualQuery
FileTimeToLocalFileTime
OpenEventW
SetStdHandle
ReadFile
GetThreadTimes
TerminateProcess
GetCurrentThread
SetEnvironmentVariableA
GetSystemTime
VirtualFree
GetStringTypeW
GetCurrentProcess
ConvertDefaultLocale
FreeEnvironmentStringsA
EnterCriticalSection
HeapFree
SetLastError
GetEnvironmentStrings
SetHandleCount
MultiByteToWideChar
GetModuleFileNameA
InterlockedExchangeAdd
WriteFile
TlsGetValue
HeapDestroy
GetCurrentThreadId
RtlUnwind
InterlockedDecrement
LeaveCriticalSection
CompareStringA
RemoveDirectoryW
ExitProcess
DeleteCriticalSection
GetVersion
TlsSetValue
IsBadWritePtr
GetConsoleOutputCP
InterlockedIncrement
InterlockedExchange
GetStartupInfoW
GetTickCount
HeapReAlloc
VirtualFreeEx
GetFileType
GetCommandLineA
TlsAlloc
QueryPerformanceCounter
GetProcAddress
FreeEnvironmentStringsW
GetDateFormatA
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 235KB - Virtual size: 261KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ