Z:\zavpgVK\sgbwiDnZzz\hTrdfrrTifl.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4a6075f2aaf767d84e74711cf0116d5a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4a6075f2aaf767d84e74711cf0116d5a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4a6075f2aaf767d84e74711cf0116d5a_JaffaCakes118
-
Size
212KB
-
MD5
4a6075f2aaf767d84e74711cf0116d5a
-
SHA1
e1d8c6ae218fc9eeaff7733dafe21609bdb68f0c
-
SHA256
336606c277dcaae2e8f3ce500e7daec7994c8ec24b8e171d2b4209b6e6f84b77
-
SHA512
df60af5848caae00eb895b174ad83b49690e7359769cf5cd3fb74a0bdd77b605923ded73546677d2b661023c1bf113c3a8f5381fc0e5d0a513e5888f1a334731
-
SSDEEP
3072:xe8EtZ5Z7dH6k9LZEH9xS1gxZbAF/S2DUKYkyO9M7UhDnfyyMwoq5L63Atq:xe8EVcH9qeAdIvhgfloh3A
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a6075f2aaf767d84e74711cf0116d5a_JaffaCakes118
Files
-
4a6075f2aaf767d84e74711cf0116d5a_JaffaCakes118.exe windows:5 windows x86 arch:x86
2bf56ede855efc129759ae58aad64e08
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
LoadImageW
SetWindowLongA
DefDlgProcA
DrawMenuBar
DrawFocusRect
GetActiveWindow
TileWindows
CheckMenuRadioItem
GetFocus
CharToOemA
TranslateAcceleratorA
SetScrollRange
LoadMenuA
ReleaseDC
SetLastErrorEx
FindWindowExW
SetDlgItemTextW
GetClassInfoExA
LoadStringA
DrawTextW
SetParent
CharNextExA
GetAsyncKeyState
LockWindowUpdate
OemToCharBuffA
SetCursor
GetClipCursor
LoadBitmapA
DestroyMenu
DrawIcon
mouse_event
EqualRect
GetKeyboardLayout
GetScrollRange
InsertMenuW
GetPropW
msvcrt
wcsncpy
_controlfp
__set_app_type
__p__fmode
iswdigit
isalnum
strpbrk
__p__commode
_amsg_exit
printf
_initterm
strcspn
_acmdln
wcstoul
exit
_ismbblead
gets
qsort
mbtowc
_XcptFilter
_exit
_cexit
__setusermatherr
__getmainargs
gdi32
SetStretchBltMode
CreateHalftonePalette
Polyline
CreateSolidBrush
OffsetRgn
CreateRoundRectRgn
SetPixel
CreateFontIndirectW
ResizePalette
GetStockObject
SetMapMode
CreatePen
SetBitmapDimensionEx
EnumFontsW
GetTextCharsetInfo
advapi32
LookupPrivilegeDisplayNameA
comdlg32
GetSaveFileNameW
CommDlgExtendedError
kernel32
GetCommConfig
DeleteFileW
GetFileAttributesExW
MoveFileExW
GetLocaleInfoA
CreateEventA
GetWindowsDirectoryA
GlobalUnlock
GlobalLock
lstrcatW
GetFileType
WaitForMultipleObjectsEx
GetCommState
VirtualQuery
GetModuleHandleA
GetPriorityClass
IsDBCSLeadByteEx
Exports
Exports
?TryEnterCriticalSectionJKDJHLJHKDljfjhl@@YGKEPA_WG@Z
Sections
.text Size: 178KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idat Size: 512B - Virtual size: 404B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.diag_y Size: 512B - Virtual size: 62B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.diag_x Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.div Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.plus Size: 512B - Virtual size: 443B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.minus Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ