d:\zeo\obopjoee.PDB
Static task
static1
Behavioral task
behavioral1
Sample
41f80d24f8a2dd77f92e3f64d4cf2190_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
41f80d24f8a2dd77f92e3f64d4cf2190_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
41f80d24f8a2dd77f92e3f64d4cf2190_JaffaCakes118
-
Size
332KB
-
MD5
41f80d24f8a2dd77f92e3f64d4cf2190
-
SHA1
154f11989aec42eb374bc33844e018b1be30037b
-
SHA256
31be74c9e3ceb7615ab2cacf8e379313f871a3e179fe1482f951d483b0813536
-
SHA512
d3ee12f06516d7def0d9120b7c5a2995b63cf67f6d52b7abb9a5c84f5decfc0644f84a5025d9ebbe1fb1783908388364eb5a16ccdeb53e2d14b58e9cd38d8fbb
-
SSDEEP
6144:FQEnubT492rvzJ460TCWbvO9alrnjPp7O2k0Q8STfR7NYBpbnK7BNYa:aEnu/492rvd0OU2WlO8QTBYjW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41f80d24f8a2dd77f92e3f64d4cf2190_JaffaCakes118
Files
-
41f80d24f8a2dd77f92e3f64d4cf2190_JaffaCakes118.exe windows:4 windows x86 arch:x86
8692aa8c5af0aed995583e88e8412217
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
shell32
SHGetMalloc
ShellExecuteEx
ExtractIconExA
SHGetSettings
user32
GetForegroundWindow
BringWindowToTop
MessageBoxW
ShowWindow
CreateWindowExA
RegisterClassExA
CascadeChildWindows
RegisterClassA
GetScrollInfo
GetKBCodePage
advapi32
LookupPrivilegeDisplayNameW
CryptSignHashA
RegConnectRegistryA
RevertToSelf
RegSaveKeyW
RegCloseKey
InitiateSystemShutdownW
CryptGetHashParam
CryptDestroyHash
RegCreateKeyExA
RegCreateKeyW
LookupPrivilegeNameW
LookupAccountSidW
CryptGetDefaultProviderW
InitializeSecurityDescriptor
wininet
FtpGetFileSize
RetrieveUrlCacheEntryFileW
InternetSetOptionA
InternetGoOnline
InternetCrackUrlW
InternetSetDialStateA
HttpOpenRequestW
InternetCombineUrlW
InternetGetCookieW
gdi32
Polyline
CreateHatchBrush
GetFontLanguageInfo
EnableEUDC
GetTextCharsetInfo
CopyEnhMetaFileA
CreateMetaFileW
GetTextFaceW
DeleteDC
GetTextMetricsW
ColorMatchToTarget
CreateDIBitmap
CloseEnhMetaFile
GetWorldTransform
MaskBlt
EnumFontFamiliesW
GetBkMode
CreateEllipticRgn
CreateDCA
AbortPath
GetDeviceCaps
GetTextCharset
GdiGetBatchLimit
SetTextJustification
kernel32
GetSystemTimeAsFileTime
GetCPInfo
GetVersionExA
GetCurrentProcessId
GetStdHandle
CreateMutexA
FreeLibrary
CreateFileA
SetConsoleCtrlHandler
GetEnvironmentStrings
ExitProcess
GetTimeFormatA
GetLastError
GetFileType
DeleteCriticalSection
HeapReAlloc
WriteFile
TlsSetValue
GetStringTypeW
GetCommandLineA
GetModuleHandleA
EnumSystemLocalesA
GetModuleFileNameW
SetHandleCount
GetTimeZoneInformation
TlsFree
VirtualFree
SetEnvironmentVariableA
InitializeCriticalSection
Sleep
OpenMutexA
TlsGetValue
HeapCreate
LeaveCriticalSection
GetCurrentThread
MultiByteToWideChar
LoadLibraryA
GetModuleFileNameA
GetCurrentProcess
QueryPerformanceCounter
GetOEMCP
CompareStringW
GetACP
GetConsoleCP
GetStringTypeA
WriteConsoleA
FlushFileBuffers
LCMapStringW
TerminateProcess
GetEnvironmentStringsW
HeapDestroy
RtlUnwind
GetCurrentThreadId
FreeEnvironmentStringsW
GetConsoleMode
InterlockedExchange
TlsAlloc
GetUserDefaultLCID
HeapAlloc
ReadFile
InterlockedDecrement
FreeEnvironmentStringsA
HeapFree
GetCommandLineW
GetStartupInfoW
VirtualAlloc
CloseHandle
InterlockedIncrement
EnterCriticalSection
GetProcessHeap
WideCharToMultiByte
WriteConsoleW
SetLastError
GetLocaleInfoA
SetStdHandle
SetFilePointer
IsValidCodePage
GetCurrentDirectoryW
GetProcAddress
LCMapStringA
GetDateFormatA
UnhandledExceptionFilter
GetStartupInfoA
IsDebuggerPresent
IsValidLocale
HeapSize
GetConsoleOutputCP
VirtualQuery
CompareStringA
GetTickCount
SetUnhandledExceptionFilter
GetLocaleInfoW
Sections
.text Size: 196KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ