G:\zwnzlgcynVOb\rNhhtNeTLH\qwooexj\uwwltguumTy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
46c9f5eb232dce9da5e1ec9128af4629_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
46c9f5eb232dce9da5e1ec9128af4629_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
46c9f5eb232dce9da5e1ec9128af4629_JaffaCakes118
-
Size
208KB
-
MD5
46c9f5eb232dce9da5e1ec9128af4629
-
SHA1
eaeb8e3801e2d5ddcf92c2dbbdcc58f5ec0c62da
-
SHA256
e2c9b57ef5f67cecacfbc914c770d5abf9350051d85098f642bc0011b99e9800
-
SHA512
c91252621430e7ecd288e5c35cf1fe5a0e79766bf3491c3e1462507e4ab662fa025d1dd6608dfc41997409feeb562d0cce2682f9c1075074f3fdcc14f4367e43
-
SSDEEP
3072:lhm2VcFWkeZFZBYv36oHWo0UId2xHRiqEumn/ccSzMDRKPRIrdSLJ59sFjIqCOB1:zm2F3LZBFo5xiquywQRIr2Js0Q0W/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 46c9f5eb232dce9da5e1ec9128af4629_JaffaCakes118
Files
-
46c9f5eb232dce9da5e1ec9128af4629_JaffaCakes118.exe windows:5 windows x86 arch:x86
c4f083fb984778300eb7742097387950
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
wcsrchr
__set_app_type
__p__fmode
__p__commode
_amsg_exit
setlocale
isspace
memcpy
_initterm
_acmdln
exit
calloc
ftell
iswalpha
_ismbblead
fprintf
_XcptFilter
_exit
_cexit
__setusermatherr
__getmainargs
vsprintf
sscanf
wcstod
kernel32
OpenFileMappingA
lstrcpyW
TlsFree
GetSystemDefaultLangID
GetLongPathNameW
CreateNamedPipeA
GetModuleHandleW
LocalAlloc
lstrlenW
lstrcmpW
GetDateFormatW
FileTimeToLocalFileTime
CreateThread
DisconnectNamedPipe
CancelWaitableTimer
GetUserDefaultLCID
advapi32
GetNumberOfEventLogRecords
SetSecurityDescriptorOwner
user32
GetAltTabInfoW
EnumChildWindows
CharLowerBuffW
GetWindowTextA
GetMessageW
InvalidateRgn
CharUpperW
GetClientRect
CharNextW
ScreenToClient
GetForegroundWindow
ShowCursor
GetParent
GetTopWindow
GetDialogBaseUnits
GetDCEx
GetMessageA
ReplyMessage
DialogBoxIndirectParamA
DestroyWindow
GetDlgItemInt
GetSystemMetrics
WaitMessage
TrackPopupMenu
LockWindowUpdate
ShowOwnedPopups
PostThreadMessageW
GetDlgCtrlID
DialogBoxIndirectParamW
GetWindowTextLengthW
GetClassNameW
GetLastActivePopup
DefDlgProcA
IsCharAlphaW
IsCharUpperA
IsDialogMessageW
gdi32
TranslateCharsetInfo
CreatePolygonRgn
CreateCompatibleDC
GetDIBits
GetTextAlign
LineTo
GetTextExtentPointA
SetWindowOrgEx
CreateRectRgnIndirect
MoveToEx
RoundRect
SetStretchBltMode
GetDIBColorTable
DeleteObject
GetTextMetricsW
Exports
Exports
AlphaBlend
GradientFill
TransparentBlt
?ValidateSDKldjhJLD@@YGKEPA_WG@Z
Sections
.text Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idat Size: 512B - Virtual size: 396B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_0 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_1 Size: 512B - Virtual size: 296B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_2 Size: 1024B - Virtual size: 945B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ydiag Size: 512B - Virtual size: 75B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mem Size: - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdiag Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ