e:\yteeeenw\qyfmuooqvw.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4cc30fd5d6d2755849015bd4aa8cccfe_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4cc30fd5d6d2755849015bd4aa8cccfe_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4cc30fd5d6d2755849015bd4aa8cccfe_JaffaCakes118
-
Size
596KB
-
MD5
4cc30fd5d6d2755849015bd4aa8cccfe
-
SHA1
984f82eddd5aa4bfdb7408a610ca89e67a521853
-
SHA256
bc138fc51b8abce047cd191a4080c17168c337f7a96f126fc50b5a3dbc0d0c76
-
SHA512
e5ef53e1a6be80ddee48fcdfa24636dc772cb1e6538db4ce7148088e3d71879a0e0f152e6960daa0d046abd7eebc55ddf9b1d3d47d661c4afed91d9404cf1804
-
SSDEEP
12288:qL/VpKj2APvnSndd7r1iN4QXYafxIeyWMRaRocgNRQ2hkbBnOH727zvv:K/VpKjJP6ndxroyQXPpIey/aKDLQtBnx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4cc30fd5d6d2755849015bd4aa8cccfe_JaffaCakes118
Files
-
4cc30fd5d6d2755849015bd4aa8cccfe_JaffaCakes118.exe windows:4 windows x86 arch:x86
271c8c00591cbb0d22805130638dbd21
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
SHGetSpecialFolderPathW
user32
OemToCharBuffA
SetWindowTextA
DdeQueryNextServer
EqualRect
GetFocus
DrawAnimatedRects
GetPriorityClipboardFormat
LoadCursorFromFileW
DdeConnectList
DefWindowProcA
CallWindowProcA
SetUserObjectSecurity
EnumDisplayDevicesW
DrawFrame
RegisterDeviceNotificationW
IsWindowUnicode
ChangeDisplaySettingsA
DdeImpersonateClient
RegisterClassA
SetClassWord
GetParent
DestroyWindow
WaitMessage
CharUpperBuffW
SetCaretBlinkTime
EnableScrollBar
DrawStateA
EnumPropsExA
CharToOemA
PackDDElParam
EnumDesktopWindows
PaintDesktop
GetThreadDesktop
IsDialogMessage
SetDlgItemTextW
ValidateRect
SendDlgItemMessageA
wsprintfA
WaitForInputIdle
FrameRect
GetClassInfoExA
ShowWindow
ShowScrollBar
TranslateAcceleratorA
GetMenuItemInfoW
CreateWindowExW
EnumDisplayMonitors
OpenDesktopW
SwitchToThisWindow
wvsprintfA
CopyRect
ToAsciiEx
RegisterClassExA
GetTabbedTextExtentW
MessageBoxA
DrawFocusRect
GetClassLongW
WindowFromPoint
SetThreadDesktop
MessageBoxExW
DlgDirSelectComboBoxExA
GetInputState
FindWindowA
PostQuitMessage
LoadAcceleratorsA
PeekMessageA
CharLowerBuffA
LoadMenuA
RegisterClipboardFormatA
GetNextDlgGroupItem
CreateWindowStationA
MoveWindow
UnloadKeyboardLayout
MessageBoxW
comdlg32
PageSetupDlgW
ReplaceTextA
PageSetupDlgA
ChooseFontW
wininet
ReadUrlCacheEntryStream
InternetReadFileExW
HttpSendRequestExA
kernel32
GetTempPathW
WriteConsoleA
OpenMutexA
ContinueDebugEvent
GetStringTypeA
GetModuleFileNameA
SetFileAttributesW
FreeEnvironmentStringsW
MoveFileA
GetEnvironmentStringsW
GetDateFormatA
WriteConsoleInputA
EnumResourceTypesW
SetTimeZoneInformation
GetACP
InterlockedExchange
CreateMailslotW
GlobalFlags
GetVersion
UnmapViewOfFile
GetConsoleCP
RtlUnwind
SetFilePointer
GetLocaleInfoA
CompareStringW
GetCPInfo
EnumSystemLocalesA
HeapAlloc
FindFirstFileW
GlobalAlloc
GetVersionExA
GetSystemDefaultLangID
TlsAlloc
TlsSetValue
WaitForMultipleObjects
VirtualAlloc
GetProcessAffinityMask
GetCurrencyFormatW
InterlockedExchangeAdd
CreateMutexA
OutputDebugStringA
GetFileType
DeleteCriticalSection
GetPrivateProfileSectionW
SetLastError
FoldStringW
CreatePipe
GetConsoleScreenBufferInfo
GetCurrentProcess
GetTempFileNameA
CreateFileA
GetCurrentProcessId
GetSystemTimeAsFileTime
EnterCriticalSection
GetLogicalDrives
WriteConsoleW
GetLastError
GlobalDeleteAtom
TlsFree
FindNextFileA
GetFileSize
TryEnterCriticalSection
GetConsoleOutputCP
GetProcAddress
SetUnhandledExceptionFilter
CreateMutexW
LCMapStringW
IsDebuggerPresent
InitializeCriticalSection
GetProcessHeap
WriteFile
GetEnvironmentStrings
WideCharToMultiByte
CreateDirectoryW
CompareStringA
GetLogicalDriveStringsA
MapViewOfFileEx
ReadFile
LocalLock
HeapCreate
GetPrivateProfileIntW
MapViewOfFile
SetThreadContext
GetConsoleMode
HeapReAlloc
TlsGetValue
VirtualAllocEx
LeaveCriticalSection
GetCurrentThread
IsValidCodePage
MultiByteToWideChar
SetConsoleCursorPosition
SuspendThread
GetOEMCP
RemoveDirectoryA
EnumSystemCodePagesA
GetTickCount
GetStartupInfoA
LCMapStringA
GetModuleHandleA
GetCurrentThreadId
LoadLibraryA
SetStdHandle
ExitProcess
GetStringTypeW
SetEnvironmentVariableA
InterlockedIncrement
LocalAlloc
HeapDestroy
IsValidLocale
EnumCalendarInfoA
TransmitCommChar
VirtualQuery
Sleep
InterlockedDecrement
SetHandleCount
GetTimeFormatA
GetCommandLineA
GetThreadPriority
EnumCalendarInfoW
HeapValidate
FlushFileBuffers
GetCompressedFileSizeW
SetWaitableTimer
GetProfileSectionA
SetEndOfFile
UnhandledExceptionFilter
PulseEvent
FreeLibrary
OpenSemaphoreA
RaiseException
QueryPerformanceCounter
VirtualLock
ResetEvent
VirtualFree
GetPrivateProfileStructW
SetConsoleCtrlHandler
FindResourceExW
GetUserDefaultLCID
GetLocaleInfoW
CloseHandle
DeleteFiber
VirtualFreeEx
GetVersionExW
HeapSize
WriteProfileSectionW
MoveFileExA
CreateDirectoryExW
TerminateProcess
SetConsoleTitleA
GlobalFix
GetTimeZoneInformation
FindFirstFileExW
GetComputerNameW
FreeEnvironmentStringsA
FoldStringA
HeapFree
GetStdHandle
comctl32
CreateToolbar
MakeDragList
ImageList_DragLeave
_TrackMouseEvent
ImageList_LoadImage
CreateUpDownControl
ImageList_Remove
DrawStatusText
ImageList_DrawEx
InitCommonControlsEx
ImageList_DragEnter
ImageList_GetImageInfo
ImageList_LoadImageW
ImageList_ReplaceIcon
ImageList_DragMove
CreateMappedBitmap
ImageList_AddMasked
ImageList_GetFlags
ImageList_GetDragImage
ImageList_GetImageRect
ImageList_Create
ImageList_GetIcon
advapi32
RegEnumKeyExA
CryptGetKeyParam
LookupPrivilegeValueW
RegEnumValueA
Sections
.text Size: 176KB - Virtual size: 174KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 248KB - Virtual size: 247KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 120KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ