U:\mtbqyYOlgEf\uYHfdoSmKyrgF\eVpaeqcU\lejhXus.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4a1ac558adf8701fd61ccec3158143f1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4a1ac558adf8701fd61ccec3158143f1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4a1ac558adf8701fd61ccec3158143f1_JaffaCakes118
-
Size
221KB
-
MD5
4a1ac558adf8701fd61ccec3158143f1
-
SHA1
5c481c5a811a48248af3c7f2c616e08fedf459cb
-
SHA256
d3fbdd983426edf2c8471410d552b70a712a5015d4479cf0d53a5be4519b5a95
-
SHA512
5f25dcfc99c02371b525c0a40887f9c6df0c36d20469a6ebc4fe7376eb3c1e9742f1ab762edf296fe6d96dd8eb3f8c75b0caea2470d0dcd2e4879bed92fab188
-
SSDEEP
3072:Oy5vOULD7W7QGfjD5n6zAdnZes+0Y7u8Yw5U40BFDybrop:tvjDpGbDUzoZc/u8YwaFaPop
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a1ac558adf8701fd61ccec3158143f1_JaffaCakes118
Files
-
4a1ac558adf8701fd61ccec3158143f1_JaffaCakes118.exe windows:5 windows x86 arch:x86
ae84e930b36af5011270c0d5c349e308
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
EnumFontsW
LineDDA
CreateSolidBrush
EndDoc
BeginPath
GetTextExtentPointW
ExtTextOutA
GetStockObject
SetBitmapDimensionEx
OffsetRgn
CreateDIBSection
UnrealizeObject
CreateHalftonePalette
RoundRect
Polygon
CreateFontIndirectW
GetSystemPaletteEntries
kernel32
CopyFileW
GetThreadLocale
DeleteCriticalSection
Sleep
CreateDirectoryA
SetThreadExecutionState
SetCommMask
ClearCommBreak
GetFileType
GetAtomNameW
GetDateFormatW
LoadLibraryExW
CreateFileA
WaitForMultipleObjectsEx
GlobalMemoryStatus
HeapReAlloc
AreFileApisANSI
GlobalUnlock
comdlg32
PrintDlgW
FindTextW
GetSaveFileNameW
user32
GetDialogBaseUnits
SendMessageTimeoutA
GetDC
GetKeyState
GetMenu
RegisterHotKey
wsprintfW
LoadCursorA
EnableMenuItem
UnionRect
GetUserObjectInformationA
DragObject
IsCharUpperA
keybd_event
ValidateRect
CharPrevA
SetDlgItemTextA
RemoveMenu
MessageBoxW
GetCaretPos
GetAltTabInfoW
SendMessageA
InvalidateRect
OemToCharBuffA
GetSysColor
IsRectEmpty
AppendMenuA
LoadImageW
LoadCursorW
CreateIconIndirect
AttachThreadInput
GetParent
GetFocus
EnumChildWindows
MonitorFromPoint
wvsprintfA
ole32
OleIsRunning
version
VerQueryValueW
msvcrt
memcpy
Exports
Exports
?SDOisioKJS@@YGKEPA_WG@Z
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bld_0 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bld_1 Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bld_2 Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bld_3 Size: 1024B - Virtual size: 685B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bld_4 Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 427B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.debug Size: 512B - Virtual size: 102B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 141KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ