C:\QESB\JQIE\AESTAV\CKEOSYAPH\SGAGK\EFQFBPQFM.PDB
Static task
static1
Behavioral task
behavioral1
Sample
440d56e4b0c2cc7cd0915cdc5dfdc93b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
440d56e4b0c2cc7cd0915cdc5dfdc93b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
440d56e4b0c2cc7cd0915cdc5dfdc93b_JaffaCakes118
-
Size
754KB
-
MD5
440d56e4b0c2cc7cd0915cdc5dfdc93b
-
SHA1
2d1a11f60ef0fec8e1a56198a7fd1d631e1c0254
-
SHA256
420ab890a729ccf561af5248c8b2febd1f8ff5d44d95d547c7b6e50afaeea70c
-
SHA512
2a0d8ee0a146cbba095e75b693046dd8457664734a171e5bd140e921b92929b374cabb9a2db9e15020de715e9e2ee72908f6b22147c239b080e748673230505a
-
SSDEEP
12288:ubV+1PvjLojgrQTzuWk9UYv/g8VCp4AKbQHR9abt61wK:ubwdbLfsHuWkiYnLyusY61wK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 440d56e4b0c2cc7cd0915cdc5dfdc93b_JaffaCakes118
Files
-
440d56e4b0c2cc7cd0915cdc5dfdc93b_JaffaCakes118.exe windows:4 windows x86 arch:x86
7668d74f2f2a818b867c3373866ee788
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
ImageList_Destroy
ImageList_SetFlags
ImageList_Read
DrawStatusTextW
CreateToolbar
ImageList_Add
ImageList_DragEnter
ImageList_LoadImage
ImageList_SetOverlayImage
ImageList_ReplaceIcon
ImageList_LoadImageA
MakeDragList
ImageList_Remove
ImageList_DragMove
ImageList_GetIconSize
user32
SetWindowPos
DefWindowProcA
IsDialogMessageW
GetShellWindow
CreateWindowExW
TranslateMessage
RegisterClassExA
RegisterClassA
DestroyWindow
GetClassWord
DdeNameService
InSendMessageEx
GetDlgItemTextW
GetMessageA
GetActiveWindow
GetSystemMenu
DefMDIChildProcW
WinHelpA
DrawTextA
RemovePropW
RegisterClipboardFormatA
EnumDesktopWindows
MessageBoxW
SetMenuItemInfoW
GetInputDesktop
ShowWindow
kernel32
VirtualLock
GetFileType
HeapCreate
InterlockedIncrement
TlsSetValue
CloseHandle
CreateProcessA
Sleep
WriteConsoleA
FindResourceA
ReadFile
GetVersionExA
CreateFileA
GetOEMCP
OpenMutexA
OpenSemaphoreA
CreateMutexA
CompareStringW
GetLastError
FreeLibrary
FlushFileBuffers
InterlockedExchange
WideCharToMultiByte
TerminateProcess
GetLocaleInfoA
InitializeCriticalSection
LCMapStringW
DeleteCriticalSection
IsValidLocale
IsValidCodePage
VirtualFree
GetCurrentThread
WriteConsoleOutputCharacterA
SetConsoleWindowInfo
VirtualQuery
GetTickCount
LocalAlloc
LeaveCriticalSection
lstrcmpiW
UnhandledExceptionFilter
GetModuleHandleA
HeapReAlloc
GetProcessHeap
TlsFree
ExpandEnvironmentStringsA
RtlUnwind
FreeEnvironmentStringsA
IsDebuggerPresent
GetSystemTimeAsFileTime
VirtualAlloc
GetTempPathW
GetCurrentThreadId
GetUserDefaultLCID
CreateRemoteThread
FreeEnvironmentStringsW
EnterCriticalSection
SetConsoleCtrlHandler
GetStartupInfoA
GetModuleFileNameA
EnumDateFormatsA
HeapAlloc
GetStringTypeW
GetACP
GetConsoleOutputCP
GlobalFindAtomA
HeapSize
WriteConsoleW
GetLocaleInfoW
MultiByteToWideChar
GetTimeZoneInformation
GetConsoleMode
SetThreadAffinityMask
GetProcAddress
GetTimeFormatA
EnumSystemLocalesA
GetCommandLineA
SetHandleCount
HeapDestroy
LCMapStringA
SetStdHandle
GetVolumeInformationW
IsBadWritePtr
SetUnhandledExceptionFilter
TlsGetValue
QueryPerformanceCounter
GetStdHandle
HeapFree
GetConsoleCP
GetEnvironmentStringsW
GetEnvironmentStrings
GetCurrentProcess
InterlockedDecrement
GetStringTypeA
GetCPInfo
WriteFile
SetFilePointer
TlsAlloc
ExitProcess
GetCurrentProcessId
SetLastError
GetDateFormatA
CompareStringA
LoadLibraryA
SetEnvironmentVariableA
Sections
.text Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 448KB - Virtual size: 447KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 134KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ