c:\ess\uaozvm\qsheabqrj\ntnsiwiuw\riowpeh\coastbvynu.PDB
Static task
static1
Behavioral task
behavioral1
Sample
42da9866af63c5c1663ed057a1f653df_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
42da9866af63c5c1663ed057a1f653df_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
42da9866af63c5c1663ed057a1f653df_JaffaCakes118
-
Size
280KB
-
MD5
42da9866af63c5c1663ed057a1f653df
-
SHA1
180081c1400a7fbd51f7669839c4c9f09a57b0b3
-
SHA256
3593505d8074fda5fd4993e426b2cbd2dfb05ceba13a901352aa43e0f02089a2
-
SHA512
df9842d3b2102b6ea2250f49fb8b77881649bcc47f27ee78e796ffad1628bf04cc270eb14ad33b82e96273eb01abf19c3ebebb8533b7d21fa1ae7bbb37fed03f
-
SSDEEP
6144:Ea6dafwJm4hNbza4BpoSMKJCAHwlj6ehtlwQ5nbFucoqE5q2C+BDrxbR:L6daa3qAtHcLhtlBF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 42da9866af63c5c1663ed057a1f653df_JaffaCakes118
Files
-
42da9866af63c5c1663ed057a1f653df_JaffaCakes118.exe windows:4 windows x86 arch:x86
f72cb66642496f373b1a54b9689688ce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleHandleA
GetNumberFormatA
GetProcAddress
CloseHandle
WaitNamedPipeA
SetConsoleOutputCP
HeapDestroy
GetCommandLineA
lstrcatW
GetTempPathW
GetCurrentThread
IsValidLocale
IsValidCodePage
GetConsoleCP
VirtualAlloc
GetCPInfo
ExpandEnvironmentStringsA
GetPriorityClass
GetFileType
CreateMutexA
SetFilePointer
WriteFile
TlsSetValue
GetThreadSelectorEntry
HeapAlloc
CompareStringA
UnhandledExceptionFilter
LeaveCriticalSection
InterlockedExchange
LCMapStringW
lstrcpyA
InitializeCriticalSection
GetAtomNameA
GetTimeZoneInformation
WriteConsoleOutputCharacterA
GetTickCount
EnterCriticalSection
FreeEnvironmentStringsA
WriteFileEx
GetProfileSectionA
GetSystemInfo
EnumDateFormatsW
IsBadWritePtr
MultiByteToWideChar
EnumDateFormatsA
EnumResourceTypesW
LoadLibraryA
FlushInstructionCache
GetOEMCP
GetPrivateProfileStringW
WideCharToMultiByte
GlobalAddAtomW
GetProcessHeaps
VirtualProtect
VirtualQuery
GetCurrentDirectoryW
SetStdHandle
DeleteCriticalSection
FillConsoleOutputAttribute
GetTimeFormatW
CreateProcessA
GetCurrentProcess
LockFileEx
SetComputerNameW
GetSystemTimeAsFileTime
SetLastError
VirtualUnlock
GetDateFormatA
LCMapStringA
EnumSystemLocalesW
FindResourceA
OpenEventA
lstrlen
HeapReAlloc
HeapFree
QueryPerformanceCounter
GlobalFindAtomA
ExitProcess
RtlUnwind
GetVersionExA
GetUserDefaultLCID
SetFileAttributesA
GetStringTypeA
HeapSize
CreateProcessW
CompareStringW
OpenMutexA
SetConsoleTitleW
GetModuleFileNameA
ReadConsoleOutputAttribute
FlushFileBuffers
SetEnvironmentVariableA
GetStringTypeW
GetLocaleInfoW
HeapCreate
GetEnvironmentStringsW
GetLocaleInfoA
SetHandleCount
GetEnvironmentStrings
TlsFree
GetDiskFreeSpaceExW
TlsAlloc
EnumSystemLocalesA
VirtualFree
FindAtomA
GetACP
GetCurrentThreadId
ReadFile
TlsGetValue
FreeEnvironmentStringsW
GetStdHandle
GetTimeFormatA
lstrcpyW
GetLastError
GetCurrentProcessId
CreateNamedPipeW
LocalCompact
GetStartupInfoA
TerminateProcess
RemoveDirectoryA
comctl32
CreateUpDownControl
DrawStatusText
ImageList_SetDragCursorImage
ImageList_GetImageRect
CreatePropertySheetPageW
DrawStatusTextW
InitCommonControlsEx
CreateStatusWindow
ImageList_DragLeave
ImageList_SetOverlayImage
ImageList_BeginDrag
wininet
RetrieveUrlCacheEntryFileW
InternetReadFileExW
user32
DeferWindowPos
RedrawWindow
CreateWindowExW
GetDlgItemInt
UnregisterHotKey
ModifyMenuW
ImpersonateDdeClientWindow
AdjustWindowRect
GetCursor
DefWindowProcW
RegisterClassExA
ModifyMenuA
GetSysColor
ChangeDisplaySettingsExA
OpenDesktopA
MonitorFromRect
SetShellWindow
GrayStringW
TranslateMessage
GetKeyNameTextA
ChildWindowFromPointEx
GetKeyboardLayout
InvalidateRect
CharToOemW
SetWindowContextHelpId
GetWindowLongA
RegisterClassA
GetClassWord
DlgDirSelectComboBoxExA
VkKeyScanA
GetMenuContextHelpId
DestroyWindow
EnumDesktopsW
DialogBoxParamA
EnumDisplaySettingsExA
GetMenuStringW
EnableScrollBar
GetWindowTextW
DdeConnectList
GetKeyboardState
GetKeyboardType
SetWindowsHookA
SetMenuItemBitmaps
InvalidateRgn
DdeImpersonateClient
CreateDesktopW
ScreenToClient
SetWindowRgn
CharUpperW
ToAscii
CallMsgFilter
EndMenu
DestroyMenu
LoadBitmapA
SetCursorPos
DlgDirSelectExW
GetKeyboardLayoutNameW
GetMenuItemCount
ShowWindow
LoadKeyboardLayoutW
TileWindows
DestroyIcon
FlashWindow
TranslateAcceleratorW
CallMsgFilterW
AdjustWindowRectEx
LoadCursorFromFileW
GetMenuInfo
MessageBoxExW
DrawMenuBar
ArrangeIconicWindows
GetClassNameA
GetMessageA
GetUserObjectInformationA
IntersectRect
GetClipboardData
DefWindowProcA
UnhookWinEvent
EnumWindowStationsW
SetMenuInfo
SwitchDesktop
CloseWindow
GetWindowContextHelpId
GetTopWindow
DdeGetData
MessageBoxA
EnumThreadWindows
CreateWindowExA
wsprintfA
GetMessageExtraInfo
LoadAcceleratorsA
GetDlgItemTextA
EmptyClipboard
CharLowerW
GetMenuItemID
SendDlgItemMessageW
IsDlgButtonChecked
Sections
.text Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ