d:\nxhoboqsba.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4b976aa778cbfd2c8735a09081cf46ea_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4b976aa778cbfd2c8735a09081cf46ea_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4b976aa778cbfd2c8735a09081cf46ea_JaffaCakes118
-
Size
350KB
-
MD5
4b976aa778cbfd2c8735a09081cf46ea
-
SHA1
355a02822eb7ce5d68a708514c4a10752aba506e
-
SHA256
2b8415e31ba463daf73113dd91bb903bc506cf052c9af3b2b58157890a63ea08
-
SHA512
0126bb5aeb864b06dd637ba576014e8c65aa3f082534d4e424f5a37c904f5a74a9e394dc1303f28ca0672ff74e319e54ac42432872dc1ffede89af8326dc539e
-
SSDEEP
6144:7frK4ILS27plRtGe5PzZe84WhuP2FDTPSXJavgTS8LqmaCtG1IU7:7TNImQfRIeZz1rFvS5av38+maCQ1d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b976aa778cbfd2c8735a09081cf46ea_JaffaCakes118
Files
-
4b976aa778cbfd2c8735a09081cf46ea_JaffaCakes118.exe windows:4 windows x86 arch:x86
2880802994610f7b297d144e327e79cf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
PrintDlgA
PageSetupDlgW
ReplaceTextA
advapi32
CryptHashData
RegDeleteValueA
CryptSetProviderExA
RegQueryInfoKeyA
CryptSetProviderW
RegSaveKeyW
RegCloseKey
LookupSecurityDescriptorPartsW
user32
EnumDisplayMonitors
SetWindowTextA
CreateWindowExA
GetOpenClipboardWindow
ModifyMenuA
LoadAcceleratorsW
GetClipCursor
GetInputDesktop
RegisterDeviceNotificationW
SetCaretPos
SetWindowRgn
GetMenuItemRect
DestroyWindow
IsWindowEnabled
RegisterClassA
IsWindowUnicode
ShowWindow
TrackPopupMenuEx
DestroyCaret
MessageBoxW
RegisterClassExA
GetMenuStringW
kernel32
FindFirstFileExW
InterlockedExchange
LoadLibraryA
MultiByteToWideChar
ReadFile
CreateThread
GetConsoleMode
GetStartupInfoA
TlsGetValue
WriteFile
IsDebuggerPresent
FreeLibrary
GetTickCount
GetCurrentProcess
GetCommandLineA
WriteConsoleA
GetModuleFileNameA
HeapReAlloc
CreateFileA
GetACP
InterlockedDecrement
EnterCriticalSection
GetProcAddress
GetPrivateProfileStructW
WriteConsoleW
UnhandledExceptionFilter
GetCurrentThread
LCMapStringA
FlushFileBuffers
GetLocaleInfoW
GetCurrentThreadId
HeapAlloc
GetLocaleInfoA
VirtualQuery
GetSystemTimeAsFileTime
GetLastError
IsValidLocale
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
GetTimeFormatA
RtlUnwind
SetLastError
CloseHandle
DeleteCriticalSection
Sleep
VirtualAlloc
GetUserDefaultLCID
GetModuleFileNameW
HeapFree
GetTimeZoneInformation
HeapCreate
TlsFree
GetEnvironmentStringsW
WriteFileEx
GetConsoleCP
InterlockedIncrement
GetCPInfo
HeapDestroy
OpenMutexA
GetStartupInfoW
SetUnhandledExceptionFilter
GetSystemDirectoryA
TlsAlloc
GetStringTypeW
GetFileType
CreateMutexA
LCMapStringW
GetCurrentProcessId
ExitProcess
CompareStringA
SetStdHandle
GetModuleHandleW
GetDateFormatA
IsValidCodePage
MoveFileA
CompareStringW
CreateSemaphoreW
GetStringTypeA
SetEnvironmentVariableA
CreateFileMappingW
GetConsoleOutputCP
LeaveCriticalSection
GetStdHandle
SetFilePointer
SetHandleCount
SetConsoleCtrlHandler
FreeEnvironmentStringsW
GetModuleHandleA
TerminateProcess
CreateEventW
SetConsoleCP
GetOEMCP
TlsSetValue
EnumSystemLocalesA
WideCharToMultiByte
GetCommandLineW
GlobalReAlloc
SetComputerNameW
VirtualFree
HeapSize
OutputDebugStringW
gdi32
SetICMProfileW
GetSystemPaletteEntries
GetCharABCWidthsFloatA
SelectClipRgn
comctl32
InitCommonControlsEx
Sections
.text Size: 220KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ