D:\jpdXlxmBzS\aexfknexA\bewwfxgspNebIH\Raboxvk.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4aba59cb6e54ee59ea74e97801a25aa2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4aba59cb6e54ee59ea74e97801a25aa2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4aba59cb6e54ee59ea74e97801a25aa2_JaffaCakes118
-
Size
93KB
-
MD5
4aba59cb6e54ee59ea74e97801a25aa2
-
SHA1
84efa55c26207bcbcb42d905098973c76b004355
-
SHA256
20888f6254963a5188211c569ca5f62d7f39aa7b93a2c164881f6769308a6270
-
SHA512
969d7f883f73f6f554b46fbc054f4edad364588277083c31bf618b1efbbc7e7c5afed803b672fa57031ede18fa0678be87805967641799505951c886c10c5ce5
-
SSDEEP
1536:p1hi6QnxHlABijr4msib4ociZrfibf7NgJx25+fZ+Ke8Y4tw3h9YYOwyjHcN4v/a:pi6Ax2gjrRbjcmmbjNgJy+f0KkIw3PS6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4aba59cb6e54ee59ea74e97801a25aa2_JaffaCakes118
Files
-
4aba59cb6e54ee59ea74e97801a25aa2_JaffaCakes118.exe windows:5 windows x86 arch:x86
a06e847568bef9b465093bf410ff0a27
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
GetMenu
EnumWindows
BeginDeferWindowPos
GetDlgItem
InternalGetWindowText
GetMenuStringA
GetClassNameW
SetWindowLongA
GetDlgItemTextA
ScreenToClient
GrayStringW
SetSysColors
wsprintfW
CascadeWindows
OpenIcon
GetNextDlgGroupItem
BringWindowToTop
UnloadKeyboardLayout
ScrollWindow
GetForegroundWindow
ReleaseDC
InvertRect
SetFocus
GetTopWindow
CharUpperBuffA
SetUserObjectInformationW
SendDlgItemMessageW
GetUserObjectInformationW
FrameRect
RegisterClassExW
CharNextW
IsIconic
HideCaret
InsertMenuA
CreateAcceleratorTableW
SetActiveWindow
RedrawWindow
SystemParametersInfoA
GetWindowRect
SetWindowPlacement
DestroyAcceleratorTable
GetSystemMetrics
AttachThreadInput
DispatchMessageW
DrawTextA
GetKeyboardLayoutNameW
LoadAcceleratorsA
SetForegroundWindow
EnableScrollBar
OemToCharBuffA
RegisterClassW
RegisterWindowMessageA
ScrollWindowEx
GetAltTabInfoA
TranslateAcceleratorW
SetTimer
LoadImageW
DragObject
DefDlgProcA
DrawFocusRect
AppendMenuA
GetClipCursor
GetNextDlgTabItem
ShowOwnedPopups
IsCharLowerA
IsWindowUnicode
DrawAnimatedRects
EqualRect
EnumThreadWindows
CharToOemW
GetKeyNameTextW
ChildWindowFromPointEx
ValidateRect
LoadBitmapW
IntersectRect
GetSysColorBrush
DrawMenuBar
GetDlgCtrlID
FindWindowExW
PeekMessageA
CharPrevW
DrawIconEx
LoadMenuA
GetWindowTextA
SetMenuItemBitmaps
DestroyMenu
mouse_event
SendNotifyMessageW
LoadStringW
InsertMenuW
CopyAcceleratorTableW
MessageBoxExW
GetSystemMenu
GetCursorPos
InvalidateRgn
PostQuitMessage
CharLowerA
GetAsyncKeyState
GetClassLongW
DeferWindowPos
DispatchMessageA
DialogBoxParamA
PostThreadMessageA
ModifyMenuW
GetWindowTextLengthW
ClipCursor
SetMenuDefaultItem
wsprintfA
GetKeyboardType
TranslateMessage
GetKeyboardLayoutList
OffsetRect
InsertMenuItemW
MessageBoxExA
DrawTextW
OemToCharA
DefWindowProcA
CharLowerW
InSendMessageEx
GetWindowTextW
CharNextA
msvcrt
isalnum
strerror
wcsrchr
towlower
qsort
_controlfp
vsprintf
getc
wcscat
__set_app_type
__p__fmode
strtok
strncpy
__p__commode
memset
gmtime
fprintf
localtime
strcpy
_amsg_exit
_initterm
fseek
wcstombs
fflush
fputs
wcstok
_ismbblead
perror
fclose
setvbuf
putchar
strspn
_XcptFilter
_exit
clock
fgets
_cexit
getenv
isspace
__setusermatherr
strtol
__getmainargs
clearerr
towupper
floor
strcoll
ungetc
isprint
shlwapi
StrToIntA
kernel32
GetComputerNameExW
SizeofResource
DisconnectNamedPipe
GetAtomNameA
CancelWaitableTimer
CreateEventW
FindResourceExW
VirtualFree
GetStdHandle
HeapUnlock
lstrcpynW
GetProcessHeap
GetNumberFormatA
CreateRemoteThread
GetModuleHandleA
GetUserDefaultUILanguage
SetHandleCount
ResumeThread
OpenEventA
HeapCreate
WaitCommEvent
IsBadWritePtr
GetModuleFileNameA
TryEnterCriticalSection
HeapFree
SetUnhandledExceptionFilter
CreateDirectoryW
SetNamedPipeHandleState
CreateSemaphoreW
GetUserDefaultLangID
GetThreadContext
UnlockFile
CancelIo
GetLongPathNameW
GetLastError
SearchPathW
EnumResourceNamesA
GetSystemDirectoryW
GetVersionExA
GetBinaryTypeA
WaitForMultipleObjectsEx
HeapLock
CreateSemaphoreA
EnumResourceNamesW
lstrcmpW
SetEvent
ResetEvent
FileTimeToDosDateTime
IsDBCSLeadByte
GetTempPathA
SetTimerQueueTimer
DeleteAtom
ClearCommBreak
FindNextChangeNotification
SetThreadLocale
LeaveCriticalSection
GetOEMCP
HeapAlloc
FileTimeToSystemTime
comdlg32
FindTextW
ChooseColorW
CommDlgExtendedError
GetSaveFileNameA
ReplaceTextW
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ