m:\xauba\dmokesa\tsyeq.pdb
Static task
static1
Behavioral task
behavioral1
Sample
434f754858c19e74d214c78758d2ed80_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
434f754858c19e74d214c78758d2ed80_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
434f754858c19e74d214c78758d2ed80_JaffaCakes118
-
Size
460KB
-
MD5
434f754858c19e74d214c78758d2ed80
-
SHA1
a394ccf066d3cefca952aafa1cffd6fa697c258e
-
SHA256
7ed3094f95fb41f0074d0499bca2c6ff5d0870ceb168baf3d96c9aa13e7ff76c
-
SHA512
93a18e4ab69c7bcbce6d61d09ab7e67d14984dc2e9ff0085d6fe0f6521befbcb551de654bd82b1d9ec2a5185eeb32d906cd8e4b23dd11bf593a699a2f46c7d22
-
SSDEEP
12288:Tt7VkJrZpDcMyti71T5tZBIxMvBJOR2JzVtemjchQwr6:Tt7Vk9ZpoW5tZOqvBJOR2JzXemJwr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 434f754858c19e74d214c78758d2ed80_JaffaCakes118
Files
-
434f754858c19e74d214c78758d2ed80_JaffaCakes118.exe windows:4 windows x86 arch:x86
bc2b3b12c62a1f72a466b8351569fee2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
GetOpenFileNameW
GetFileTitleA
LoadAlterBitmap
PrintDlgW
kernel32
GetLocalTime
GetFileSize
FormatMessageA
DeleteCriticalSection
WriteFile
GetCPInfo
GetEnvironmentStringsW
GlobalAddAtomW
FreeEnvironmentStringsA
ReadFile
ExitProcess
GetOEMCP
WideCharToMultiByte
HeapAlloc
GetModuleHandleA
VirtualQueryEx
CreateMutexA
GetCurrentDirectoryW
VirtualAlloc
HeapFree
LCMapStringA
CreateSemaphoreW
GetLastError
LoadLibraryA
InitializeCriticalSection
ConvertDefaultLocale
GetCurrentThreadId
GetStartupInfoA
GetFileType
IsBadWritePtr
HeapCreate
LeaveCriticalSection
GetCommandLineA
EnterCriticalSection
GetSystemTime
CreatePipe
SetStdHandle
GetModuleFileNameA
CloseHandle
GetStringTypeA
HeapDestroy
UnhandledExceptionFilter
GetPrivateProfileSectionNamesA
GetSystemInfo
InterlockedDecrement
GetSystemTimeAsFileTime
GetTimeZoneInformation
SetLastError
GetProcAddress
TlsFree
FileTimeToLocalFileTime
OpenMutexA
VirtualQuery
lstrcpyn
GetCurrentProcess
SetEnvironmentVariableA
FreeEnvironmentStringsW
FindResourceW
CompareStringW
QueryPerformanceCounter
InterlockedIncrement
LCMapStringW
GetEnvironmentStrings
GetCurrentProcessId
TerminateProcess
GetTickCount
SetHandleCount
TlsSetValue
SetFilePointer
GetCurrentThread
TransactNamedPipe
MultiByteToWideChar
CommConfigDialogW
TlsGetValue
HeapReAlloc
VirtualFree
GetStringTypeW
GetStdHandle
FlushFileBuffers
GetACP
GetVersion
GetConsoleScreenBufferInfo
MapViewOfFile
InterlockedExchange
RtlUnwind
CompareStringA
LocalUnlock
TlsAlloc
advapi32
CryptSetProviderExA
RevertToSelf
gdi32
PtInRegion
GetCharWidth32A
EndPath
GetCharABCWidthsW
GetObjectW
GetDeviceCaps
EnableEUDC
SelectObject
CloseMetaFile
GetCurrentPositionEx
GetDIBits
DeleteDC
DeleteObject
StartPage
GetObjectType
CreateDCA
PlayEnhMetaFile
GetWorldTransform
wininet
CommitUrlCacheEntryW
comctl32
ImageList_Duplicate
ImageList_Draw
DrawStatusTextW
ImageList_Create
CreateMappedBitmap
ImageList_LoadImageW
ImageList_GetImageCount
ImageList_Write
ImageList_Read
CreateStatusWindowW
ImageList_SetDragCursorImage
CreateUpDownControl
InitMUILanguage
InitCommonControlsEx
ImageList_SetBkColor
CreateToolbar
user32
EnumPropsExA
WINNLSGetEnableStatus
GetScrollBarInfo
GetForegroundWindow
GetDoubleClickTime
CopyIcon
GetWindowLongW
CharUpperBuffA
RegisterClassExA
GetShellWindow
DdeGetLastError
SendNotifyMessageW
MessageBoxIndirectA
RegisterClipboardFormatA
CreateDialogIndirectParamA
AdjustWindowRect
RegisterClassExW
MapVirtualKeyA
IsRectEmpty
DefWindowProcW
SetDlgItemTextW
DlgDirSelectExA
PeekMessageA
SetCursor
DrawStateA
CallMsgFilterW
WinHelpW
MessageBoxA
GetPropA
ShowWindow
GetDCEx
PtInRect
HideCaret
DdeCreateDataHandle
GetCapture
RemovePropW
DestroyWindow
CreateWindowExA
SendInput
GetSubMenu
ChangeDisplaySettingsExW
SetPropW
RegisterWindowMessageA
RegisterClassA
Sections
.text Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 257KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ