d:\eheegxkta\mewrqkpt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
481d8854756364d8f28fb7866b25bee3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
481d8854756364d8f28fb7866b25bee3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
481d8854756364d8f28fb7866b25bee3_JaffaCakes118
-
Size
288KB
-
MD5
481d8854756364d8f28fb7866b25bee3
-
SHA1
2396a06f6b719d39634fbc8d9c7ddc2ae22c3b32
-
SHA256
26233e03f3ab3bf45159d323e82efb3ffc614073e61762262c065f51332de22c
-
SHA512
34221a9f168321eb7cda8f72d2987f08e34f0f9a6b1bd364d9ee8227a23e86cb5f170d576c7160fe6fe59a389b86741107159c00df0127e8c7674c16d4694222
-
SSDEEP
6144:wSaB5zL9za5YND51ITroMczN2eNscOLQpNhKiq3gG8:wSo+5UjITroMwHbNhKi9G8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 481d8854756364d8f28fb7866b25bee3_JaffaCakes118
Files
-
481d8854756364d8f28fb7866b25bee3_JaffaCakes118.exe windows:4 windows x86 arch:x86
e53410a309c1b948df7e50b635cdc467
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WriteConsoleInputA
LoadLibraryW
GetUserDefaultLCID
CloseHandle
TlsFree
SetThreadLocale
SetLastError
GetPrivateProfileSectionW
GetTickCount
GetLongPathNameA
GetStdHandle
GetSystemTimeAdjustment
GetTimeZoneInformation
TlsSetValue
GetLastError
GetLocaleInfoW
RtlUnwind
RaiseException
GetCommandLineA
GetStringTypeA
LCMapStringW
GetModuleHandleA
GetShortPathNameA
SetEnvironmentVariableA
EnumResourceTypesA
GlobalDeleteAtom
HeapFree
GetSystemInfo
CompareStringW
GetOEMCP
InterlockedIncrement
lstrcmpi
DuplicateHandle
FreeEnvironmentStringsA
WriteFile
GetPrivateProfileSectionNamesA
EnumSystemLocalesA
FreeEnvironmentStringsW
FillConsoleOutputCharacterW
GetEnvironmentStrings
IsBadWritePtr
LCMapStringA
lstrcpyA
VirtualAlloc
MultiByteToWideChar
CreateFileW
GlobalSize
OpenMutexA
GetVersionExA
GetCurrentProcess
DeleteCriticalSection
GetCurrentProcessId
LeaveCriticalSection
GetACP
HeapSize
VirtualProtect
EnumTimeFormatsA
GetEnvironmentStringsW
GetStartupInfoA
WriteProfileSectionW
LoadLibraryExA
IsValidCodePage
GetSystemTimeAsFileTime
SetHandleCount
HeapReAlloc
GetFileAttributesA
GetModuleFileNameA
QueryPerformanceCounter
EnumSystemCodePagesW
TlsGetValue
ExitProcess
FlushInstructionCache
SetStdHandle
GetPrivateProfileStructW
GetProfileStringW
InitializeCriticalSection
OpenEventA
VirtualQuery
UnhandledExceptionFilter
TerminateProcess
SetThreadIdealProcessor
EnumSystemCodePagesA
SetConsoleTextAttribute
IsValidLocale
GetCPInfo
LocalAlloc
GetDateFormatA
SetVolumeLabelW
FindFirstFileExW
ReadConsoleOutputAttribute
HeapAlloc
GetCurrencyFormatW
GetCurrentThread
LockResource
WideCharToMultiByte
InterlockedExchange
EnterCriticalSection
WritePrivateProfileStringW
FlushFileBuffers
CreateFileMappingA
UnmapViewOfFile
GetTimeFormatA
GetStringTypeW
TlsAlloc
GetTempFileNameA
SystemTimeToTzSpecificLocalTime
GetProcessHeap
GetProcAddress
SetFilePointer
GetFileType
HeapCreate
GetThreadPriorityBoost
VirtualFree
GetLocaleInfoA
LoadLibraryA
GetCurrentThreadId
CreateMutexA
OpenMutexW
CompareStringA
ReadFile
HeapDestroy
GetVersionExW
comctl32
ImageList_GetImageCount
ImageList_Copy
ImageList_DrawIndirect
ImageList_SetIconSize
ImageList_Destroy
ImageList_GetIcon
CreateToolbarEx
ImageList_BeginDrag
InitCommonControlsEx
ImageList_SetFilter
DrawInsert
ImageList_GetImageRect
ImageList_AddIcon
ImageList_SetFlags
ImageList_Write
ImageList_SetImageCount
DrawStatusText
ImageList_Duplicate
CreatePropertySheetPageA
CreatePropertySheetPageW
ImageList_EndDrag
ImageList_AddMasked
user32
IsRectEmpty
ValidateRgn
GetCapture
CreatePopupMenu
SetWindowTextA
EnumClipboardFormats
CreateWindowExW
IsCharUpperA
DialogBoxParamW
ClientToScreen
GetClassWord
TileWindows
DestroyWindow
UnhookWindowsHookEx
MessageBoxW
DefWindowProcW
WindowFromPoint
SetActiveWindow
SetPropA
IsDialogMessageA
DefWindowProcA
VkKeyScanExW
GetTitleBarInfo
DefDlgProcA
SetMenu
DeleteMenu
TabbedTextOutW
CharNextW
MenuItemFromPoint
RegisterClassA
GetDlgItem
DefDlgProcW
UnhookWindowsHook
GetPropW
EditWndProc
CreateWindowStationA
EnumWindowStationsW
DrawFrameControl
SetWindowWord
RegisterClassExA
GetUserObjectInformationA
SendNotifyMessageA
IsWindowEnabled
BroadcastSystemMessage
GetKeyboardLayoutList
SystemParametersInfoW
EndTask
GetCaretBlinkTime
DdeInitializeW
FindWindowA
CallWindowProcA
InsertMenuW
ShowWindow
ShowCursor
SetFocus
InflateRect
RemovePropA
GetMessageA
DrawTextExA
MonitorFromRect
GetKeyNameTextA
comdlg32
GetSaveFileNameA
ChooseFontA
Sections
.text Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ