F:\xkssjuhXldfSrZ\yzLixffjYg\sXLgVPVbhgswnr\JzoctWppTKeti.pdb
Static task
static1
Behavioral task
behavioral1
Sample
49974a4be79df631eabb39965917bacd_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
49974a4be79df631eabb39965917bacd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
49974a4be79df631eabb39965917bacd_JaffaCakes118
-
Size
221KB
-
MD5
49974a4be79df631eabb39965917bacd
-
SHA1
9a3d394fff8b21c2ad57148b4d7e180bda8bedc9
-
SHA256
1693a6ad4c2d31ec7adc8b2bec8f8aa42a6fc344b65bc289a1b222e4f95ed012
-
SHA512
e8a5440f98ce8bd781fd321474203caec4ca94134685046bc972525dc139accceb0cf98e9231259afd07909a4dd4f8a65713c61c4b701127fcde9045110aac64
-
SSDEEP
6144:5q8V+yGlBE0bc/PCmYh5vbWU2imNuqYWLi:JVJN/P7KZ9mNu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 49974a4be79df631eabb39965917bacd_JaffaCakes118
Files
-
49974a4be79df631eabb39965917bacd_JaffaCakes118.exe windows:5 windows x86 arch:x86
ca27a5537ee1472747a4a7d2461a4916
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
OffsetRgn
GetBitmapBits
CreatePatternBrush
DeleteObject
CreateFontIndirectA
SetAbortProc
SetBitmapDimensionEx
SetMapMode
SetDIBits
Ellipse
Polyline
GetWindowOrgEx
GetTextMetricsA
BitBlt
SaveDC
SetViewportExtEx
GetViewportOrgEx
msvcrt
memcpy
user32
GetUserObjectInformationA
GetClientRect
OpenInputDesktop
CharToOemBuffA
SetUserObjectInformationW
IsCharLowerA
EnumThreadWindows
ScrollWindowEx
GetDialogBaseUnits
LoadMenuA
SetScrollPos
CheckMenuRadioItem
InSendMessageEx
DeleteMenu
RedrawWindow
SetWindowRgn
OemToCharBuffA
DrawFocusRect
DefDlgProcA
IsRectEmpty
SetRect
GetDlgItemTextA
AppendMenuW
ClipCursor
SetCaretPos
PostThreadMessageW
RegisterWindowMessageW
GetKeyboardLayoutList
SetLastErrorEx
DialogBoxParamA
GetMonitorInfoW
DrawIconEx
DestroyWindow
CreateIconIndirect
GetAltTabInfoW
TrackPopupMenuEx
InvalidateRect
kernel32
GetSystemWindowsDirectoryW
SetSystemTime
lstrcatW
EnumResourceNamesW
SetFileTime
HeapFree
SetMailslotInfo
GetOverlappedResult
FindResourceA
lstrlenA
FindCloseChangeNotification
FindNextFileW
RaiseException
LoadResource
TryEnterCriticalSection
GetLongPathNameW
SetThreadLocale
ole32
OleIsRunning
comdlg32
PrintDlgW
GetFileTitleW
PageSetupDlgW
GetOpenFileNameW
PrintDlgExW
version
VerQueryValueW
Exports
Exports
?SDOisioKJS@@YGKEPA_WG@Z
Sections
.text Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dat_0 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_1 Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dat_2 Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_3 Size: 1024B - Virtual size: 562B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_4 Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 344B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.debug Size: 512B - Virtual size: 114B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ