D:\waldo\v1300\Common\dll\PROD\CorelPP-APP.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4d3c43b328cfc5047659b27bf151bfe3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4d3c43b328cfc5047659b27bf151bfe3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4d3c43b328cfc5047659b27bf151bfe3_JaffaCakes118
-
Size
161KB
-
MD5
4d3c43b328cfc5047659b27bf151bfe3
-
SHA1
9025c6745723b9fccf528a5b57a4e7c86bc51244
-
SHA256
f1f2dde6bf35aed8cf3a723c625d78b1b045ac66c6637bfdbf4d6edd8678379c
-
SHA512
217de801015c57f7fc9a7ddf948a9150f8da8473124a26b625507fec98126bcd3eda1f01a997354e1c5e41f8e8824da753fd6629aa1a576724b1ccf245ea915b
-
SSDEEP
3072:cjzvVUmB9HR+UseKnzeKEIR+04l/yhN1ZYTeXwDG/ifQnWgc:cXzBSrnzeK9jI4nWR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d3c43b328cfc5047659b27bf151bfe3_JaffaCakes118
Files
-
4d3c43b328cfc5047659b27bf151bfe3_JaffaCakes118.exe windows:4 windows x86 arch:x86
b6b39fcdeca2207f71a24d8fca1f5dc3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc71u
ord1386
ord1182
ord1178
ord3155
ord1270
ord5633
ord3590
ord602
ord347
ord6086
ord760
ord1271
ord577
ord870
ord5485
ord4074
ord5398
ord2460
ord287
ord776
ord2311
ord293
ord1003
ord774
ord1476
ord3927
ord2366
ord283
ord268
ord280
ord1197
ord2461
ord383
ord3383
ord896
ord899
ord5231
ord5229
ord2384
ord2394
ord2392
ord2390
ord2386
ord2409
ord2397
ord1647
ord1646
ord1590
ord1058
ord2895
ord4027
ord2121
ord1156
ord583
ord2361
ord502
ord5637
ord5636
ord1925
ord3204
ord572
ord3151
ord4255
ord4480
ord3943
ord2638
ord3703
ord3713
ord3712
ord2985
ord2527
ord2640
ord2534
ord2856
ord2708
ord4301
ord2829
ord2725
ord2531
ord5196
ord1955
ord5171
ord1353
ord4961
ord3339
ord6275
ord3796
ord6273
ord1513
ord2163
ord2169
ord2399
ord2381
ord2379
ord2402
ord2407
ord2388
ord2404
ord931
ord927
ord929
ord925
ord920
ord5956
ord1591
ord4276
ord4716
ord3397
ord5210
ord4179
ord6271
ord5067
ord1899
ord5148
ord4238
ord1393
ord3940
ord1608
ord1611
ord5911
ord1534
ord1626
ord380
ord3451
ord2897
ord5319
ord1430
ord629
ord1908
ord1079
ord1021
ord746
ord762
ord558
ord6133
ord764
msvcr71
?terminate@@YAXXZ
__security_error_handler
_onexit
__dllonexit
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_amsg_exit
_wcmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
??1type_info@@UAE@XZ
memset
_resetstkoflw
_waccess
wcslen
calloc
wcsncpy
malloc
_wsplitpath
free
?_set_se_translator@@YAP6AXIPAU_EXCEPTION_POINTERS@@@ZP6AXI0@Z@Z
wcsrchr
wcscpy
_except_handler3
_CxxThrowException
_wcsnicmp
__CxxFrameHandler
_controlfp
kernel32
WaitForSingleObject
CloseHandle
GetVersion
GetFileAttributesW
GetProcAddress
GetCurrentProcessId
CreateEventW
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetPrivateProfileIntW
GetVersionExW
SetEvent
GetACP
InterlockedExchange
EnterCriticalSection
lstrlenW
GetStartupInfoW
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
GetVersionExA
GlobalDeleteAtom
GlobalFindAtomW
CreateMutexW
ReleaseMutex
LoadLibraryW
GetLastError
SetLastError
OutputDebugStringA
LoadLibraryExW
FreeLibrary
SetUnhandledExceptionFilter
RaiseException
InitializeCriticalSection
DeleteCriticalSection
GetUserDefaultLCID
HeapFree
HeapAlloc
GetProcessHeap
GetFileSize
OutputDebugStringW
ReadFile
CreateFileW
lstrcmpiW
lstrcpyW
LockResource
LoadResource
FindResourceW
LeaveCriticalSection
user32
GetClientRect
EndPaint
BeginPaint
FindWindowW
RedrawWindow
EndDialog
ShowWindow
GetDesktopWindow
LoadCursorW
UpdateLayeredWindow
IsWindow
GetDC
SetRect
LoadStringW
CopyRect
DrawTextW
ReleaseDC
GetParent
GetSysColor
IsRectEmpty
AdjustWindowRect
SetWindowPos
OffsetRect
CreateDialogParamW
InflateRect
GetSystemMetrics
DestroyWindow
InvalidateRect
UpdateWindow
EnableWindow
SendMessageW
GetWindowRect
PostMessageW
GetMessageW
DispatchMessageW
TranslateMessage
DdeInitializeW
DdeCreateStringHandleW
DdeGetData
GetWindowLongW
SetWindowTextW
PostThreadMessageW
DdeUninitialize
DdeNameService
gdi32
Rectangle
CreatePalette
GetDeviceCaps
CreateSolidBrush
GetNearestColor
GetStockObject
GetTextExtentPoint32W
DeleteObject
GetTextFaceW
CreateFontIndirectW
GetTextMetricsW
SelectObject
DeleteDC
CreateCompatibleDC
RectVisible
TextOutW
SetTextAlign
SetBkMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
RealizePalette
SelectPalette
GetObjectW
SetDIBColorTable
CreateDIBSection
StretchDIBits
gdiplus
GdipGetImagePixelFormat
GdipGetImagePaletteSize
GdipGetImagePalette
GdipCreateBitmapFromFile
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromScan0
GdipBitmapLockBits
GdipBitmapUnlockBits
GdiplusStartup
GdiplusShutdown
GdipFree
GdipGetImageGraphicsContext
GdipDrawImageI
GdipAlloc
GdipCloneImage
GdipGetImageWidth
GdipDisposeImage
GdipDeleteGraphics
GdipGetImageHeight
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE