E:\OASEDIEBMO\SJFPNPPD\IMK\QLMQIAX\XEBFZQP.PDB
Static task
static1
Behavioral task
behavioral1
Sample
41cfe1ecaf046aae59ee3a3f4f29fa16_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
41cfe1ecaf046aae59ee3a3f4f29fa16_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
41cfe1ecaf046aae59ee3a3f4f29fa16_JaffaCakes118
-
Size
335KB
-
MD5
41cfe1ecaf046aae59ee3a3f4f29fa16
-
SHA1
38324accd3644d3b888b19fd76dd015dc4a65601
-
SHA256
84a2c94abec80af43d83bb9ef02f0262cbddf5a21917d737da8f44c5af60bee4
-
SHA512
7e35dcfafe57e25c62c41afd8a2fe14ee37037cd6f5c118cb8bdf82097e866eb8ca2567d60c8b20a3695cbeac6f8c37770b1ff08145fbd2b47f95d97d91fbb6a
-
SSDEEP
6144:rrVxVvaRNTTU8cPD90k+XVENa76IUUBP4+6cz3ji0MA:rrVbYup0k+F/76e4Xm3r
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41cfe1ecaf046aae59ee3a3f4f29fa16_JaffaCakes118
Files
-
41cfe1ecaf046aae59ee3a3f4f29fa16_JaffaCakes118.exe windows:4 windows x86 arch:x86
7531ba863c1328a28a669c2d48e30ba2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_DrawIndirect
ImageList_GetImageCount
CreatePropertySheetPageA
CreateToolbarEx
_TrackMouseEvent
DrawStatusTextA
ImageList_Create
ImageList_Destroy
ImageList_GetImageInfo
ImageList_EndDrag
ImageList_Replace
ImageList_AddMasked
ImageList_DragMove
ImageList_SetImageCount
DrawInsert
ImageList_GetImageRect
ImageList_SetDragCursorImage
ImageList_Draw
ImageList_Remove
CreatePropertySheetPage
ImageList_BeginDrag
InitCommonControlsEx
ImageList_GetDragImage
CreateToolbar
kernel32
FreeEnvironmentStringsW
GetStringTypeW
GetModuleFileNameA
HeapReAlloc
RtlUnwind
LCMapStringA
GetWindowsDirectoryW
VirtualFree
MultiByteToWideChar
SetHandleCount
LoadLibraryA
GetTickCount
HeapCreate
GetSystemTime
FreeEnvironmentStringsA
GetStartupInfoA
GetTimeZoneInformation
TlsGetValue
GetExitCodeThread
FlushFileBuffers
CompareStringA
HeapAlloc
LeaveCriticalSection
QueryPerformanceCounter
CloseHandle
FindFirstFileA
GetACP
EnterCriticalSection
LockFile
GetFileType
UnhandledExceptionFilter
GetLastError
GetConsoleCP
HeapDestroy
OpenMutexA
VirtualAlloc
LocalCompact
SetEnvironmentVariableA
SetFilePointer
GetCurrentProcessId
GetModuleHandleA
GetEnvironmentStringsW
TerminateProcess
CreateMutexA
GetCommandLineA
ExitProcess
GetCurrentProcess
GetVersionExA
GetConsoleTitleA
GetPrivateProfileSectionNamesA
WaitForSingleObject
InterlockedExchange
GetDiskFreeSpaceW
GetShortPathNameW
GetLocalTime
CompareStringW
ReadFile
TransactNamedPipe
GetOEMCP
AllocConsole
GetEnvironmentStrings
WriteFile
TlsAlloc
InitializeCriticalSection
TlsFree
TlsSetValue
SetStdHandle
GetCurrentThread
GetStdHandle
DeleteCriticalSection
GetCurrentThreadId
GetSystemTimeAsFileTime
OpenSemaphoreW
InterlockedIncrement
GetProcAddress
DebugBreak
SetLastError
GetCPInfo
OpenWaitableTimerA
GetStringTypeA
LCMapStringW
LockResource
VirtualQuery
WideCharToMultiByte
GetLogicalDrives
IsBadWritePtr
EnumTimeFormatsA
HeapFree
InterlockedDecrement
GetVersion
user32
EnumWindows
RegisterClassExA
CharLowerW
ShowWindow
DrawStateA
AdjustWindowRect
DestroyWindow
SetClassLongW
RegisterClassA
CallMsgFilterW
SetWindowPlacement
EnumDesktopsA
GetWindowContextHelpId
wsprintfW
MessageBoxA
GetOpenClipboardWindow
SendNotifyMessageA
DefWindowProcA
CreateWindowExW
MapVirtualKeyExW
DdeCmpStringHandles
DestroyCaret
Sections
.text Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 73KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ