Z:\ebjJLxjyRzhyzc\tZeleghRwi\xgufwjwasyhjm.pdb
Static task
static1
Behavioral task
behavioral1
Sample
41e5a5ee0ecb37ac452175855b844eda_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
41e5a5ee0ecb37ac452175855b844eda_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
41e5a5ee0ecb37ac452175855b844eda_JaffaCakes118
-
Size
206KB
-
MD5
41e5a5ee0ecb37ac452175855b844eda
-
SHA1
e676cfc4c788d518a8ed54363a99ec0f7d79c0a2
-
SHA256
560c077f7b4fa31493470a2dc45e71964520a36b1fd28f22e59d8a812cdba57c
-
SHA512
82a03f19e436bf8498a63dea72f96894b2198c028de0e4777555d3b58e8265d5f7fd389b6489df1663ffb14c8b9788a7ec0a6dff9a131e0b08e93ba6e5cf970d
-
SSDEEP
3072:VRGxOxksuTi520+nM4QAiZhax9hOc/+J9Z6DHqr/F9ERPFGaKJCXyuNwR0RIfTvQ:V5kd00MEiixj5+JfwHW+PY1AXx9RQv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41e5a5ee0ecb37ac452175855b844eda_JaffaCakes118
Files
-
41e5a5ee0ecb37ac452175855b844eda_JaffaCakes118.exe windows:5 windows x86 arch:x86
58bbd360b7d69ca329231c5edffce9ef
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
EnableScrollBar
GetSystemMenu
ScrollWindowEx
MessageBoxA
ExitWindowsEx
SetMenu
IsWindow
IsDlgButtonChecked
SetRectEmpty
GetDialogBaseUnits
EnumWindows
RedrawWindow
GetMessageA
SetMenuItemBitmaps
InvalidateRect
GetKeyState
CreateWindowExW
GetDCEx
IsDialogMessageW
SetLastErrorEx
GetWindowDC
AllowSetForegroundWindow
CharLowerA
CheckMenuItem
SetActiveWindow
GetMenuItemInfoW
PeekMessageA
wvsprintfA
GetClassInfoW
GetKeyboardLayoutList
SendDlgItemMessageW
CheckMenuRadioItem
IsWindowUnicode
ModifyMenuW
GetMessageTime
AttachThreadInput
InsertMenuItemW
DispatchMessageW
GetClassLongW
DrawFrameControl
CharPrevA
GetKeyNameTextW
SetForegroundWindow
GetWindow
GetMenuStringW
IsDialogMessageA
SetDlgItemInt
GetScrollRange
CallWindowProcW
GetDlgItemTextA
RegisterWindowMessageW
PtInRect
DialogBoxIndirectParamA
CharToOemW
WindowFromPoint
AppendMenuA
GetDoubleClickTime
DrawEdge
SetDlgItemTextW
TranslateMessage
OemToCharA
DestroyWindow
GetMonitorInfoW
RegisterHotKey
EnableMenuItem
GetDlgItemTextW
CreateAcceleratorTableW
ChildWindowFromPointEx
FindWindowW
MoveWindow
GetUserObjectInformationW
ShowWindow
GetSystemMetrics
MessageBoxExW
GetPropW
CopyAcceleratorTableW
SetRect
SetScrollInfo
CreateDialogIndirectParamW
LookupIconIdFromDirectory
GetTopWindow
IsZoomed
RemoveMenu
RegisterClassW
BeginPaint
TrackPopupMenu
TabbedTextOutW
SetPropW
GetShellWindow
SwapMouseButton
OpenIcon
GetDlgItemInt
LoadAcceleratorsA
IsWindowVisible
mouse_event
GetKeyboardType
SetFocus
FindWindowA
OpenDesktopW
GetMenu
MapVirtualKeyW
UnionRect
LoadMenuW
GetSysColorBrush
SetClassLongW
RegisterClassA
KillTimer
SetScrollPos
BringWindowToTop
AdjustWindowRect
EndPaint
EndTask
GetNextDlgTabItem
ClipCursor
LoadStringW
GetDC
ShowScrollBar
OffsetRect
DialogBoxIndirectParamW
LoadImageW
InSendMessageEx
GetWindowRect
InvalidateRgn
GetDesktopWindow
DrawIcon
CharNextExA
DragObject
GetActiveWindow
PostQuitMessage
comdlg32
FindTextW
GetFileTitleW
GetSaveFileNameW
ReplaceTextW
PrintDlgW
PageSetupDlgW
gdi32
CreateRectRgnIndirect
IntersectClipRect
GetTextAlign
BitBlt
RestoreDC
ScaleWindowExtEx
SetMapMode
RectInRegion
Ellipse
CreateCompatibleBitmap
EndPage
GetTextExtentPoint32A
GetRgnBox
SetPaletteEntries
SetViewportOrgEx
RectVisible
SetDIBitsToDevice
StartPage
CreatePenIndirect
MoveToEx
Rectangle
CombineRgn
CreateDiscardableBitmap
ExtFloodFill
SetWindowOrgEx
GetTextMetricsA
CreateCompatibleDC
GetSystemPaletteUse
GetTextExtentPoint32W
SetDIBColorTable
DeleteDC
BeginPath
GetTextColor
GetNearestColor
SetBkColor
GetDeviceCaps
EnumFontsW
SetBrushOrgEx
ExtTextOutA
CreateFontIndirectW
CreatePatternBrush
SetTextColor
Escape
SaveDC
SelectObject
OffsetRgn
SelectClipRgn
StartDocW
RemoveFontResourceW
EnumFontFamiliesExW
OffsetViewportOrgEx
GetFontData
GetTextExtentPointA
kernel32
lstrcpyA
FindFirstFileA
GetTickCount
GetShortPathNameW
GetCurrentDirectoryW
DisconnectNamedPipe
SetFileAttributesA
CreatePipe
SetThreadLocale
GetLocaleInfoW
MoveFileExA
GetModuleHandleA
GetThreadContext
SetUnhandledExceptionFilter
CompareStringA
GetComputerNameExA
InitializeCriticalSection
LocalLock
GetTempPathW
WriteFile
GetComputerNameA
lstrlenA
SetSystemTimeAdjustment
WaitForMultipleObjectsEx
FindNextFileW
GetSystemDefaultUILanguage
GetBinaryTypeW
GlobalAddAtomA
HeapWalk
FileTimeToLocalFileTime
GlobalMemoryStatusEx
FreeResource
IsDBCSLeadByteEx
DeleteFileW
lstrcatW
GetACP
RemoveDirectoryW
FileTimeToSystemTime
GetSystemDirectoryA
GetModuleFileNameA
RegisterWaitForSingleObject
FormatMessageA
FlushViewOfFile
GlobalSize
GetTimeFormatW
CreateMutexA
FindFirstChangeNotificationW
LeaveCriticalSection
GetCommModemStatus
VirtualProtect
HeapUnlock
FlushFileBuffers
DeleteCriticalSection
GetSystemDirectoryW
WaitForSingleObjectEx
GetComputerNameW
FindResourceExA
GetComputerNameExW
IsValidLanguageGroup
msvcrt
tolower
putchar
_controlfp
strcpy
__set_app_type
strtol
__p__fmode
__p__commode
strncpy
isupper
malloc
localtime
atoi
isspace
_amsg_exit
strtok
_initterm
mbtowc
wcstok
wcscspn
_acmdln
fseek
isxdigit
strrchr
isdigit
setlocale
fputs
exit
strcoll
sscanf
fputc
_ismbblead
wcstol
_XcptFilter
gets
_exit
realloc
vsprintf
_cexit
__setusermatherr
strspn
isalpha
swprintf
wcsstr
memset
calloc
swscanf
getenv
mbstowcs
__getmainargs
fgetc
Exports
Exports
?SendDataNew@@IJPA_NJPAN@X
?CopyObjectW@@IJGD@X
?InvalidateMediaTypeEx@@IJXGH@X
?PutComponentExA@@IJGPAJ@X
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ