D:\VQOTTETB\XKGVIC\LNHM\EEM\DEGGASECK\GEEWASIE.PDB
Static task
static1
Behavioral task
behavioral1
Sample
4bab68d0da1b554c5773fa7dcc03da2e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4bab68d0da1b554c5773fa7dcc03da2e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4bab68d0da1b554c5773fa7dcc03da2e_JaffaCakes118
-
Size
532KB
-
MD5
4bab68d0da1b554c5773fa7dcc03da2e
-
SHA1
8bd57c53a2afc122446772a7ed943d9f1e791556
-
SHA256
5bd0dd8773e431db60f7fb259c4f7af6917e8256821dc9c0469129c631350118
-
SHA512
e407683051ab84d42a3ac9d3b8d5e0091377e6e6a2b7e02052bf52bc60f46bcaae5a0daacaec3ec8eb853d780a60219035527a1bb1971c5874964027643a972b
-
SSDEEP
12288:kkpuqa6rp8adDLwdlgl80pgXWlhm+HwEQ:kkoqJiaGdlgl8alIIv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4bab68d0da1b554c5773fa7dcc03da2e_JaffaCakes118
Files
-
4bab68d0da1b554c5773fa7dcc03da2e_JaffaCakes118.exe windows:4 windows x86 arch:x86
db504d5883a5dffb1df22674333b1c28
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
VkKeyScanExW
GetClipboardFormatNameW
LoadAcceleratorsA
DefWindowProcA
MessageBoxA
DialogBoxParamW
InSendMessage
TrackMouseEvent
CreateWindowExA
SetProcessDefaultLayout
CharNextExA
SetPropW
FindWindowW
SystemParametersInfoA
ShowWindow
CharLowerBuffA
GetDoubleClickTime
SetDebugErrorLevel
SetFocus
MonitorFromRect
MessageBoxExA
SetDoubleClickTime
CreateIconFromResourceEx
GetDesktopWindow
LoadCursorFromFileA
GetAltTabInfo
RegisterClassA
SetScrollRange
SetDlgItemTextA
DialogBoxIndirectParamW
SetSysColors
SetClipboardViewer
GetKBCodePage
RegisterClassExA
DrawStateW
ModifyMenuA
MapVirtualKeyExW
MessageBoxW
SetActiveWindow
IsZoomed
EnumDisplaySettingsExW
ChangeMenuW
ShowScrollBar
GetDlgItemTextW
SetWinEventHook
GetOpenClipboardWindow
GetWindowTextLengthW
PaintDesktop
GetClipboardFormatNameA
DestroyWindow
kernel32
FreeLibrary
HeapAlloc
GetConsoleCP
TlsFree
WritePrivateProfileStructW
CloseHandle
HeapCreate
ReadFile
GetTimeFormatA
VirtualQuery
IsValidCodePage
GetProcessHeap
GetTimeZoneInformation
GetStartupInfoA
GetConsoleOutputCP
FreeEnvironmentStringsW
MultiByteToWideChar
GetCPInfo
IsValidLocale
GetStartupInfoW
SetFilePointer
lstrcpyW
LCMapStringA
RtlUnwind
TerminateProcess
GetCurrentProcessId
GetProcAddress
CompareStringW
TlsSetValue
GetConsoleMode
FlushFileBuffers
GetModuleFileNameA
GetEnvironmentStrings
WideCharToMultiByte
GetCurrentProcess
SetConsoleCtrlHandler
CreateFileA
GetCommandLineA
GetLocaleInfoW
GetStringTypeW
ExitProcess
SetEnvironmentVariableA
GetLastError
FreeEnvironmentStringsA
DeleteCriticalSection
TlsGetValue
SetHandleCount
GetModuleHandleA
CompareStringA
UnhandledExceptionFilter
GetOEMCP
HeapDestroy
GetStdHandle
VirtualFree
HeapFree
OpenSemaphoreW
GetLocaleInfoA
TlsAlloc
SetStdHandle
GetCurrentThread
HeapReAlloc
InitializeCriticalSection
GetEnvironmentStringsW
VirtualAlloc
WriteFile
LoadLibraryA
InterlockedIncrement
QueryPerformanceCounter
GetModuleFileNameW
GetTickCount
InterlockedExchange
IsDebuggerPresent
GetUserDefaultLCID
GetStringTypeA
InterlockedDecrement
GetFileSize
GetSystemTimeAsFileTime
OpenMutexA
WriteConsoleA
GetDateFormatA
GetCurrentThreadId
GetThreadTimes
CreateMutexA
Sleep
LCMapStringW
GetFileType
GetVersionExA
EnterCriticalSection
GetACP
GetProfileSectionW
SetUnhandledExceptionFilter
LeaveCriticalSection
EnumSystemLocalesA
WriteConsoleW
GetCommandLineW
HeapSize
SetLastError
shell32
ShellExecuteExA
comctl32
InitCommonControlsEx
ImageList_GetBkColor
comdlg32
GetFileTitleW
Sections
.text Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 255KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ