e:\eqrbdw\tabfoevba\tjacguewud\iks\oobx\xvo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
47484f5cfa1fb9ff733d438e2de3ba8f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
47484f5cfa1fb9ff733d438e2de3ba8f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
47484f5cfa1fb9ff733d438e2de3ba8f_JaffaCakes118
-
Size
467KB
-
MD5
47484f5cfa1fb9ff733d438e2de3ba8f
-
SHA1
0e3b37c41e82dc4d6f0f602792729d75ed95bcac
-
SHA256
29c506324a134d1496095937e1057a925dd8f6015020f100f74a7e7ff619b867
-
SHA512
a30a35ba4f3691f655b0c0108d52e1b479e143d399ba3c88376796a30b62663eb7e7474ca9b0582c721484151da52c4a6cf635f8d13e0e6cf8d66554ac307fbb
-
SSDEEP
6144:mN2xNIfJXlyLN+PpWvEd9bLtygh3KN2emMQ0qn2FpspqqQEYY0jCLWGNuYBaTNId:mzfjyk9d9bn6uEpZqQEYVFklUqOq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 47484f5cfa1fb9ff733d438e2de3ba8f_JaffaCakes118
Files
-
47484f5cfa1fb9ff733d438e2de3ba8f_JaffaCakes118.exe windows:4 windows x86 arch:x86
b9097198c8322e1e00c6321f653cf401
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetAlgIdToStringA
user32
CharPrevA
ImpersonateDdeClientWindow
LoadKeyboardLayoutA
GetMenuState
DefWindowProcW
ShowWindow
RegisterClassA
CreateWindowExA
RegisterClassExA
DestroyWindow
LockWindowUpdate
TrackMouseEvent
EndDeferWindowPos
PostQuitMessage
IsDialogMessageA
SetWindowPlacement
DefDlgProcW
MessageBoxA
GetClipboardFormatNameW
EnumDisplaySettingsExW
ChangeClipboardChain
LoadAcceleratorsA
DefWindowProcA
LookupIconIdFromDirectory
EndMenu
comctl32
ImageList_DrawIndirect
ImageList_BeginDrag
ImageList_LoadImageW
_TrackMouseEvent
InitCommonControlsEx
CreateToolbar
ImageList_DragMove
CreateStatusWindowW
ImageList_Remove
kernel32
GetVolumeInformationW
DeleteFiber
GetLastError
LeaveCriticalSection
GetDiskFreeSpaceExW
GetThreadTimes
GetStringTypeA
LCMapStringW
UnhandledExceptionFilter
GetProcessShutdownParameters
WideCharToMultiByte
AddAtomA
VirtualQuery
UnmapViewOfFile
GetCPInfo
GetEnvironmentStringsW
GetCurrencyFormatA
UnlockFileEx
GetProcAddress
TransactNamedPipe
LoadModule
EnterCriticalSection
FreeEnvironmentStringsA
OpenMutexA
FindResourceW
SetHandleCount
OpenFileMappingW
GetStartupInfoA
TlsAlloc
GetVersion
GetCurrentProcess
SetCurrentDirectoryA
GetFileAttributesExW
GetTickCount
GetFileAttributesW
LoadLibraryA
WaitForMultipleObjects
ConnectNamedPipe
IsBadWritePtr
LCMapStringA
SetLastError
GetCompressedFileSizeW
lstrcatA
CreateMutexA
RtlUnwind
GlobalFindAtomA
HeapDestroy
HeapAlloc
InterlockedIncrement
IsDebuggerPresent
SetTimeZoneInformation
GetEnvironmentStrings
LoadLibraryW
HeapFree
MultiByteToWideChar
WriteConsoleOutputAttribute
WaitNamedPipeA
GetLocalTime
GlobalUnlock
GetLocaleInfoA
GetCurrentThread
VirtualAlloc
GetCommandLineW
SetFilePointer
SetEnvironmentVariableA
GetPrivateProfileStructW
WriteConsoleInputA
GetTempFileNameA
WriteConsoleW
lstrcatW
QueryPerformanceCounter
CompareStringA
GetDiskFreeSpaceW
CreateWaitableTimerA
GetModuleFileNameW
WritePrivateProfileSectionW
CommConfigDialogW
GetComputerNameA
TlsFree
InterlockedExchange
GetSystemTimeAsFileTime
lstrlenW
InterlockedDecrement
GetCurrentProcessId
FileTimeToLocalFileTime
SetConsoleCP
InitializeCriticalSection
ExitProcess
GetCommandLineA
SetConsoleActiveScreenBuffer
SetFileTime
IsBadReadPtr
TlsSetValue
CloseHandle
SetSystemTime
FlushFileBuffers
CreateEventW
GetSystemInfo
GetShortPathNameA
ReadFile
WriteFile
FindNextChangeNotification
DeleteCriticalSection
CompareStringW
GetPrivateProfileIntW
VirtualFree
GetLogicalDriveStringsW
GetCurrentThreadId
SetConsoleWindowInfo
GetSystemDefaultLangID
GetModuleHandleA
GetFileType
HeapCreate
GetPriorityClass
CreateProcessA
FindFirstFileExW
FreeEnvironmentStringsW
RtlZeroMemory
TerminateProcess
SetStdHandle
CreateMutexW
EnumDateFormatsExW
lstrcat
GetExitCodeThread
GetProfileSectionA
GetModuleFileNameA
GetProcessHeaps
TlsGetValue
GlobalReAlloc
ReadFileEx
SetEnvironmentVariableW
GetStringTypeW
HeapReAlloc
GetTimeZoneInformation
GetStdHandle
GetSystemTime
GetStartupInfoW
gdi32
SetGraphicsMode
SetBkColor
GetTextExtentPoint32A
GetStretchBltMode
EqualRgn
DescribePixelFormat
UpdateICMRegKeyA
StretchBlt
Rectangle
SetStretchBltMode
EndPath
DeviceCapabilitiesExW
SetBitmapBits
CreateEllipticRgn
UpdateICMRegKeyW
SelectClipPath
comdlg32
ReplaceTextW
GetSaveFileNameW
Sections
.text Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 253KB - Virtual size: 253KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 102KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ