c:\eteq\dvwwtag\fooevslaeq\kgh.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4d08fe9f716ac9db159a0de0b0970432_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4d08fe9f716ac9db159a0de0b0970432_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4d08fe9f716ac9db159a0de0b0970432_JaffaCakes118
-
Size
499KB
-
MD5
4d08fe9f716ac9db159a0de0b0970432
-
SHA1
9537886d0ce051a474c0fdc10a90cce4c9bc5f80
-
SHA256
cd8ce593d59c93a7479e58bb2e7615e7de3779f02ea6f23f8e8b5b004817c7e7
-
SHA512
7ee4657922c8ebfbe94fdeea6c072725bf86d8d24dcf6c74e511b092fc38242ea2eaaf347604ef58094c220d5d04f51dba9b6d43385352c81ce3271c4087cae0
-
SSDEEP
12288:tWBML2p1tp/i433v6OHYwBFenJHOoUOAMUo8x:tWBMLK1tp/imvfHYw8JH7lS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d08fe9f716ac9db159a0de0b0970432_JaffaCakes118
Files
-
4d08fe9f716ac9db159a0de0b0970432_JaffaCakes118.exe windows:4 windows x86 arch:x86
eb774b347778731525e175ec9950e6ad
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
RegisterClassA
SetWindowsHookExW
ChildWindowFromPointEx
GetParent
ShowWindow
CreateWindowExW
MapDialogRect
IsMenu
LoadKeyboardLayoutW
wvsprintfA
MessageBoxA
RemovePropW
TranslateAcceleratorA
RegisterClassExA
HideCaret
advapi32
RegSaveKeyA
RegOpenKeyExW
kernel32
InitializeCriticalSection
GetCurrentProcess
EnumResourceLanguagesA
VirtualQuery
IsValidLocale
GetTickCount
GetCurrentProcessId
GetThreadContext
GetCPInfo
GetDateFormatA
LCMapStringW
GetLocaleInfoW
TlsGetValue
LCMapStringA
HeapDestroy
GetFileType
GetModuleFileNameA
CompareStringW
VirtualFree
GetCurrentThread
TransactNamedPipe
MultiByteToWideChar
GetStringTypeW
EnterCriticalSection
SetStdHandle
GetVersionExA
EnumSystemLocalesA
FreeEnvironmentStringsW
SetLastError
GetModuleHandleA
GetStdHandle
GetOEMCP
GetEnvironmentStringsW
CreateMutexA
RtlUnwind
LoadLibraryA
InterlockedExchange
TlsSetValue
CloseHandle
GetLastError
TlsFree
QueryPerformanceCounter
CommConfigDialogW
GetStringTypeA
GetCommandLineA
VirtualAlloc
HeapReAlloc
LeaveCriticalSection
IsBadWritePtr
ExitProcess
VirtualProtect
GetUserDefaultLCID
HeapCreate
GetSystemTimeAsFileTime
GetTimeFormatA
OpenMutexA
GetCurrentThreadId
GetSystemInfo
GetEnvironmentStrings
GetThreadPriorityBoost
IsValidCodePage
GetACP
HeapFree
HeapSize
MapViewOfFile
WriteFile
GetProcAddress
GetTimeZoneInformation
SetEnvironmentVariableA
TerminateProcess
UnhandledExceptionFilter
GetLocaleInfoA
HeapAlloc
SetHandleCount
DeleteCriticalSection
GetStartupInfoA
TlsAlloc
SetFilePointer
FreeEnvironmentStringsA
EnumCalendarInfoExW
WideCharToMultiByte
FlushFileBuffers
ReadFile
CompareStringA
GlobalFindAtomW
gdi32
GetGlyphOutline
gdiPlaySpoolStream
GetDeviceCaps
GetICMProfileA
CreateDCW
SetDIBits
GetStretchBltMode
FlattenPath
SetPixel
PlayMetaFileRecord
DeleteDC
shell32
SHGetDataFromIDListA
SHAddToRecentDocs
wininet
InternetSetOptionExW
InternetWriteFileExA
comctl32
InitCommonControlsEx
Sections
.text Size: 321KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ