H:\Yztvoexetob\kfUVrYBxeeQsf\kmpgsArxWrrW\xpccutbv\MSvbbzYujCnoq.pdb
Static task
static1
Behavioral task
behavioral1
Sample
48c899b32eeb09cc5d4c40b6a83f9ed6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
48c899b32eeb09cc5d4c40b6a83f9ed6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
48c899b32eeb09cc5d4c40b6a83f9ed6_JaffaCakes118
-
Size
68KB
-
MD5
48c899b32eeb09cc5d4c40b6a83f9ed6
-
SHA1
4bd494e84c60cb0fd6608c861ab05be087882694
-
SHA256
60995830f4c4c15a12dc29a763bf2eccf20db32b1f3f4ce8fa227061717f66a1
-
SHA512
01b72d8839b94f82a7d86dd1a8487374df087195ead0d8a67eb5f6d7232acc2314dba61ce70581867a74b68c72a8f688c4a076f3e910d3dcbccceaa947e8da3b
-
SSDEEP
1536:jSsJdBkvOqvbr+M3Zvnh3wWjgsbnrhU7/Amv:jhdmWqvb5NhgWEsblU7/A4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48c899b32eeb09cc5d4c40b6a83f9ed6_JaffaCakes118
Files
-
48c899b32eeb09cc5d4c40b6a83f9ed6_JaffaCakes118.exe windows:5 windows x86 arch:x86
66ee8ae3cf2a4b85dbf30aadab767ca6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
LoadCursorW
BeginPaint
GetWindowTextA
ShowScrollBar
WaitMessage
LoadStringW
RegisterHotKey
CallWindowProcA
DialogBoxParamW
GetPropW
RegisterClassA
GetMenuCheckMarkDimensions
CreateWindowExW
SetSysColors
WindowFromPoint
GetMessageTime
GetWindowTextW
wvsprintfW
keybd_event
GetCursorPos
MapVirtualKeyExW
GetMenuState
GetMenuStringA
MapWindowPoints
GetTopWindow
GetWindowLongA
GetMenuItemInfoW
EnumChildWindows
CheckMenuItem
GetSysColor
GetClassNameW
CreateCaret
WaitForInputIdle
ValidateRect
AttachThreadInput
MapDialogRect
MessageBoxExW
CharToOemA
DrawFrameControl
GetSysColorBrush
SetDlgItemInt
GetDlgItem
IsWindowVisible
GetClassLongA
IsDialogMessageA
PostQuitMessage
GetWindowPlacement
GetClassInfoExA
GetClassInfoA
SetWindowPlacement
DestroyIcon
SetLastErrorEx
GetSystemMetrics
GetFocus
MonitorFromPoint
LoadIconA
PeekMessageA
OpenIcon
DrawAnimatedRects
DrawStateW
LockWindowUpdate
LookupIconIdFromDirectory
InvertRect
TrackPopupMenuEx
GetKeyboardLayout
GetDlgItemTextA
RegisterClassExA
AppendMenuW
SetWindowPos
mouse_event
GrayStringW
BeginDeferWindowPos
CreateCursor
SetDlgItemTextW
GetWindowDC
AdjustWindowRect
InvalidateRgn
CharToOemBuffA
SetWindowTextA
CheckRadioButton
PostThreadMessageW
GetParent
SendDlgItemMessageW
GetUpdateRgn
GetScrollRange
GetSubMenu
CreateDialogParamA
TabbedTextOutW
InvalidateRect
MoveWindow
IsWindowUnicode
DestroyAcceleratorTable
AppendMenuA
FindWindowW
DefFrameProcA
GetScrollPos
ReplyMessage
IsZoomed
FindWindowExW
IsWindow
RegisterWindowMessageA
CharNextA
CharUpperW
ChildWindowFromPointEx
MapVirtualKeyA
FillRect
SendDlgItemMessageA
CharNextExA
GetMessageA
CreateDialogIndirectParamW
CreateMenu
InsertMenuA
CheckMenuRadioItem
DestroyWindow
RemovePropW
LoadMenuW
SetCursorPos
LoadImageW
GetUserObjectInformationW
CascadeWindows
DispatchMessageA
msvcrt
wcscpy
_controlfp
iswxdigit
strncpy
fgetc
__set_app_type
tolower
iswalpha
__p__fmode
realloc
gmtime
wcstol
swprintf
towlower
strpbrk
gets
__p__commode
_amsg_exit
_initterm
perror
_ismbblead
isdigit
strtol
fputc
remove
iswspace
fclose
atoi
bsearch
wcsrchr
iswprint
_XcptFilter
_exit
mktime
wcstok
wcslen
_cexit
__setusermatherr
setvbuf
strstr
fprintf
__getmainargs
sscanf
strerror
isalpha
memset
strtoul
sprintf
system
kernel32
GetStartupInfoA
CompareFileTime
CreateFileW
GetTickCount
VirtualAlloc
EnterCriticalSection
SetTimerQueueTimer
SizeofResource
CreateWaitableTimerW
GetThreadTimes
GetModuleHandleW
UnmapViewOfFile
GetTempPathA
GetDateFormatW
OpenEventW
TlsFree
WriteFile
SetMailslotInfo
GlobalFlags
IsBadReadPtr
GetVersionExW
UnlockFile
IsValidLocale
GetBinaryTypeA
CreateEventW
VirtualQuery
SetCurrentDirectoryW
GlobalFree
GetSystemDirectoryA
CancelWaitableTimer
GetVersionExA
OpenSemaphoreW
LoadLibraryW
GetBinaryTypeW
FindResourceA
GlobalSize
DisconnectNamedPipe
CompareStringA
CreateNamedPipeW
CreateSemaphoreA
GlobalAddAtomA
GetSystemWindowsDirectoryA
GetSystemDirectoryW
GetFileAttributesA
FreeLibrary
lstrlenW
GetCommandLineA
CreateNamedPipeA
WaitCommEvent
GetSystemDefaultUILanguage
FindClose
GetStdHandle
QueryDosDeviceW
GetWindowsDirectoryA
GetCommModemStatus
Exports
Exports
?ReadInfoFile@@YGK_KHE:O
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.init Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.erts Size: 512B - Virtual size: 83B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wall Size: 512B - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.info Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.udata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ