U:\dfujhmwpRWq\fuhUFmsvmbRufgvAgcOziY\ebcToDEiCeerd\YizymgrLVpkWnLrnR\gAwkzvYSjejZvi\daephLMolbnhreckenb\uowDrmtlpkvuGfqH\PjNfuHOfqlxacserx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4ca258429d945c253ead5af004d13c38_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4ca258429d945c253ead5af004d13c38_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4ca258429d945c253ead5af004d13c38_JaffaCakes118
-
Size
142KB
-
MD5
4ca258429d945c253ead5af004d13c38
-
SHA1
da46de5f185fa48ec47d93c921a34e46d294f3c8
-
SHA256
2c6c623a6cf87f137ddf72a6925e055885addada9dc75e27ac890af07e301b14
-
SHA512
0e3ce5d67bd30ad146f5fa4672d049ba27d8726957307eac7b2944f4425c705cc3def4b8844adc8a4c90cd43ef757f129a321933a626633b09592f148a452b9b
-
SSDEEP
3072:jo8G4T5hMy9b49W5XlO2IC/Fa5cbt41SG+ODZ:TFdm0XRYcG+ODZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ca258429d945c253ead5af004d13c38_JaffaCakes118
Files
-
4ca258429d945c253ead5af004d13c38_JaffaCakes118.exe windows:5 windows x86 arch:x86
3896ea7f22a08d8cdc216a9a5feb6f3b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
ChrCmpIA
StrToIntA
PathSearchAndQualifyA
kernel32
ClearCommBreak
GetFullPathNameW
GetSystemWindowsDirectoryW
SizeofResource
lstrcpynW
LocalSize
TlsGetValue
GetStdHandle
GetModuleHandleA
lstrcmpiW
GetThreadPriority
lstrlenW
GlobalMemoryStatusEx
EscapeCommFunction
GetCommandLineA
GetFileAttributesExA
comctl32
CreatePropertySheetPageA
ImageList_GetIconSize
ImageList_Create
ImageList_AddMasked
user32
GetUpdateRect
GetTopWindow
GetMessageExtraInfo
GetSubMenu
EnumWindows
DefWindowProcA
SetSysColors
MessageBoxW
MessageBoxA
LoadStringW
DeferWindowPos
RemovePropW
GetFocus
EnumChildWindows
WindowFromPoint
SetFocus
FindWindowW
RemoveMenu
DestroyCaret
GetClassLongA
BeginDeferWindowPos
SetWindowRgn
GetMenuCheckMarkDimensions
GetClassInfoW
InvalidateRect
ClientToScreen
SetScrollPos
LoadMenuA
EqualRect
msvcrt
exit
comdlg32
PrintDlgExW
GetOpenFileNameA
FindTextW
ChooseFontW
gdi32
GetTextColor
GetBitmapBits
Escape
GetTextExtentPointA
GetTextAlign
SetBitmapDimensionEx
GetDIBColorTable
DeleteObject
StartDocW
OffsetViewportOrgEx
ExtTextOutA
EnumFontFamiliesExW
Exports
Exports
?DDSE_N_NH@@YGHPAD_N@Z
?pgtjffiT_Mkqx__Ynhooq@@YGDIPAD@Z
?_O__wkyh_RZJ@@YGPAEPAN@Z
?WVTC_jcwawpn__baxevdZ_@@YGGE@Z
?qUMUAFAWh@@YGFDPAI@Z
?bhnx_OWBVBMEXQEJF_TeD_@@YGHMI@Z
?_sWEHrkzd@@YGMM@Z
?s__lon_sGGPHojztzisx_y@@YGXPAM@Z
?RHYAQAQLMMsit__iogr@@YGPAX_NPAD@Z
?jhw_Y_W__AK_CZQJg@@YGJPANJ@Z
?D__UH__NKX__BMETc_h_d@@YGJK@Z
?Vrfuti_p@@YGKFM@Z
?jcmipjbRMyJHRP@@YGPAXPAJI@Z
?TUTFS_f@@YGFIPAD@Z
?DD__VKQ@@YGPADI@Z
?LNZWIQEy_rspzl@@YGK_N@Z
?_fWCkap_jutrZ@@YGPA_NPAI@Z
?FTLHqf__Ubtnko_dm@@YG_NGH@Z
?KWyk_spmMYR@@YGHM@Z
?kxsrHNDOL@@YGPAFH@Z
?K_wq_tyBlpp_LAIGI@@YGPAGPAHPAM@Z
?sF_A__CTD__MSKRFjw@@YGPAHPAIF@Z
?PQ_AOPX_B__CPlu@@YGGDH@Z
?IQQDz_m_xinjzpqvlw_eGX@@YGPAIM@Z
?jq_zoB_MBLdgpn@@YGPAEFF@Z
?tUYV_DUztkrv__l@@YGFGPAE@Z
?wcfG_Q__J_@@YGPAXDPAM@Z
?p_lcep_SH_ZIXWFVE_D@@YGFFPAD@Z
?HJR_PLCY_LRG_szvo_XNX@@YGKK@Z
?XQhsfetQYS@@YGFPAI@Z
?IUbqqKNTGYJAI_UFAQR__Q@@YGPAJHPAM@Z
?HIXUN_Kgmz@@YGPAFG@Z
?WSK_BZ_Il@@YGKPAGI@Z
?T_YDeuhxn_bzRC_@@YGMI@Z
?FuycETAM_Zovha_mhgnK@@YG_N_NF@Z
?BQJ_EB_shu_fKrs@@YGXI@Z
?Trfp___p@@YGPA_NG@Z
?_pu_ukVYXc@@YGPAGEPAJ@Z
?JMPIOXOHzn_f_p_hFTX@@YGHPAG@Z
?lP_WIG_Ts@@YGFK@Z
?EYxwD_SDOf_aivXWs__@@YGXM@Z
?rlc_wegkuhkj@@YGPAEDH@Z
?_dL_Y_w@@YGGMPAN@Z
?DABSvlvny_@@YGDPAEPAM@Z
?J_SLG_K@@YGDJG@Z
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 189KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ