f:\fesbmbzyax\zkiof.pdb
Static task
static1
Behavioral task
behavioral1
Sample
474238e99e29e520f6deedb99238aae2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
474238e99e29e520f6deedb99238aae2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
474238e99e29e520f6deedb99238aae2_JaffaCakes118
-
Size
460KB
-
MD5
474238e99e29e520f6deedb99238aae2
-
SHA1
a18cd11ae2c4b8697b07b5eb7149d6f79047bb83
-
SHA256
508337ae2b001b0c0af30e1aa1d26b84c9a1f05293da38d502223939f484923c
-
SHA512
ddd9a0edf849fac0d63ff2faeea907c4c146554985f8d566d032e7d1fb103697acadffc9b4f638cdc81a9cad0c6a0e32b4f789c7296b552b2132b30f0ffbac76
-
SSDEEP
6144:CS+T8F7sh3Jj6oSenLeqHTb5hJOG2vY/O14moFbapFnK6ugo9BK9vyy5u2tkMk:CS+QF7svjSbgJyFvkAPAw9r5u2tdk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 474238e99e29e520f6deedb99238aae2_JaffaCakes118
Files
-
474238e99e29e520f6deedb99238aae2_JaffaCakes118.exe windows:4 windows x86 arch:x86
098ccb943854a4ef62ac1a7891f4ccaf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
GetClassLongW
ToAsciiEx
RegisterClassA
CreateWindowExW
DefWindowProcA
MessageBoxW
GetUpdateRect
GetUserObjectInformationA
ShowWindow
ShowCursor
SetWindowTextW
SetMenu
RegisterDeviceNotificationW
DestroyWindow
SetScrollRange
PostMessageA
CallMsgFilter
MessageBoxA
DdeInitializeA
IsCharLowerW
EnumPropsA
RegisterClassExA
AdjustWindowRect
TranslateAcceleratorW
DdeAddData
kernel32
GetSystemTimeAsFileTime
QueryPerformanceCounter
CreateEventA
RtlUnwind
RtlMoveMemory
GetProfileStringW
HeapCreate
UnhandledExceptionFilter
ExitProcess
FindAtomW
GetSystemTime
HeapFree
ReadConsoleOutputCharacterW
GetStartupInfoA
CreateMutexA
HeapReAlloc
GetStringTypeA
GetStringTypeW
LocalFlags
CompareStringW
LoadLibraryExW
GetWindowsDirectoryA
ExpandEnvironmentStringsA
GetStdHandle
GetVersion
GetModuleFileNameA
VirtualFree
GetFileSize
SetFilePointer
GetFileType
LCMapStringW
GetCPInfo
InterlockedExchange
InterlockedDecrement
lstrcpyn
FreeEnvironmentStringsA
TlsGetValue
GetLocalTime
GetCurrentThreadId
SetHandleCount
OpenEventW
LocalHandle
SetLastError
LoadLibraryA
ReadConsoleA
GlobalReAlloc
SetStdHandle
GetLastError
EnterCriticalSection
DeleteFiber
GetSystemInfo
GetEnvironmentStrings
GetConsoleScreenBufferInfo
OpenMutexA
IsBadWritePtr
GetModuleHandleA
InterlockedIncrement
DeleteCriticalSection
GetStringTypeExA
ReadFile
LoadLibraryExA
HeapAlloc
HeapDestroy
TlsAlloc
TlsFree
LeaveCriticalSection
GetFileTime
GetCommandLineA
GetProfileIntA
GetProcAddress
GetTimeZoneInformation
FlushFileBuffers
SystemTimeToTzSpecificLocalTime
GetCurrentThread
VirtualQuery
GetCurrentProcess
FreeEnvironmentStringsW
SetVolumeLabelA
FormatMessageW
TlsSetValue
WideCharToMultiByte
TerminateProcess
GetTickCount
LCMapStringA
CloseHandle
GetOEMCP
SetEnvironmentVariableA
GetEnvironmentStringsW
GetLogicalDriveStringsA
OpenWaitableTimerW
WriteFile
MultiByteToWideChar
CompareStringA
VirtualAlloc
InitializeCriticalSection
ConvertDefaultLocale
GetACP
GetCurrentProcessId
comdlg32
GetOpenFileNameA
comctl32
CreateStatusWindowA
ImageList_Add
ImageList_DragShowNolock
ImageList_GetFlags
ImageList_Destroy
ImageList_LoadImage
ImageList_Merge
ImageList_GetImageCount
ImageList_DragMove
ImageList_Draw
ImageList_EndDrag
ImageList_Write
ImageList_SetOverlayImage
InitCommonControlsEx
CreateStatusWindowW
ImageList_Copy
ImageList_GetImageInfo
ImageList_Create
CreateStatusWindow
ImageList_Read
Sections
.text Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 248KB - Virtual size: 245KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ