d:\oea\edqnj\cssscr\okvl\jyea.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5ae68ee5378091b24e400cc125f16787_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5ae68ee5378091b24e400cc125f16787_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5ae68ee5378091b24e400cc125f16787_JaffaCakes118
-
Size
968KB
-
MD5
5ae68ee5378091b24e400cc125f16787
-
SHA1
0e58a45ea1ef7a749a9c9748f6806f5a9936ddad
-
SHA256
a04beb76fa90db1e32d35eae211c36a371482a0b03e44fe0b62cff12fa0cdf8d
-
SHA512
991eba214cbeaa41b45b23edecf31dcdbd6bbe8943acf4f61feef5e235493e7966ebf12b5a024d919859f2edc65430903e8747053d89cbf78aefc7a32d6b1542
-
SSDEEP
12288:EGkqCyuAcEpYRzABH+0o6Hr8A0WybkV6TrfoYrkRxD+oVoPi/otzmyRM6sGS7uGo:BzcEpP9SKYbWU5RkKoudtS57j8CWH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5ae68ee5378091b24e400cc125f16787_JaffaCakes118
Files
-
5ae68ee5378091b24e400cc125f16787_JaffaCakes118.exe windows:4 windows x86 arch:x86
4f2e278c344d70111654a39857f89ff6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
oleaut32
LoadTypeLi
comctl32
InitCommonControlsEx
ImageList_Create
comdlg32
GetOpenFileNameA
GetFileTitleA
GetSaveFileNameA
user32
GetSubMenu
GetCapture
InsertMenuA
GetDlgItem
CreateDialogIndirectParamA
InflateRect
SetWindowsHookExA
DestroyCaret
GetWindow
ScrollWindow
TabbedTextOutA
ValidateRect
GetIconInfo
GetLastActivePopup
GetDC
WaitForInputIdle
UnregisterHotKey
LoadImageA
DestroyCursor
SetMenuItemBitmaps
PeekMessageA
BeginDeferWindowPos
IsWindowEnabled
LockWindowUpdate
GetDlgCtrlID
DestroyIcon
ShowOwnedPopups
FindWindowA
ClientToScreen
TranslateAcceleratorA
GetClassInfoExA
SetCursor
SystemParametersInfoA
DispatchMessageA
RegisterClassA
GetActiveWindow
CloseClipboard
FillRect
CopyRect
GetWindowPlacement
GetMenu
ShowWindow
GetNextDlgTabItem
UnregisterClassA
DrawTextExA
SetCapture
SetRectEmpty
DestroyWindow
UnionRect
ScreenToClient
SetScrollInfo
GetMessagePos
GetNextDlgGroupItem
DeleteMenu
DrawStateA
CheckMenuItem
RemoveMenu
GetTopWindow
CopyIcon
CreatePopupMenu
InvalidateRect
EqualRect
ExitWindowsEx
GetParent
CreateWindowExA
LoadStringA
RegisterWindowMessageA
GetClipboardData
GetScrollRange
SetMenuDefaultItem
IsWindow
GetCursorPos
UnhookWindowsHookEx
GetClassInfoA
SetClassLongA
CharNextA
DrawIconEx
mouse_event
EnumWindows
GetClassLongA
SetParent
ReuseDDElParam
OpenClipboard
CharUpperA
SendDlgItemMessageA
TrackPopupMenu
GetMessageA
DrawFrameControl
DestroyMenu
SetWindowLongA
WinHelpA
SetWindowPos
HideCaret
RedrawWindow
ModifyMenuA
CallNextHookEx
SetWindowRgn
RegisterHotKey
IsWindowVisible
ReleaseDC
FrameRect
DestroyAcceleratorTable
EndDialog
WindowFromPoint
GetWindowTextA
UnpackDDElParam
GetWindowTextLengthA
AppendMenuA
GetWindowRect
InsertMenuItemA
GetWindowThreadProcessId
SetCursorPos
SetTimer
GetWindowDC
IsIconic
UpdateWindow
SetDlgItemTextA
GetMenuItemCount
GetSystemMetrics
SetForegroundWindow
GetAsyncKeyState
GetClientRect
ReleaseCapture
LoadBitmapA
GetKeyState
SetCaretPos
DefWindowProcA
KillTimer
SetWindowPlacement
PostThreadMessageA
PostQuitMessage
GetKeyNameTextA
MessageBeep
BringWindowToTop
GetScrollInfo
PtInRect
RegisterClipboardFormatA
DrawTextA
EndDeferWindowPos
GetMenuStringA
GetMenuCheckMarkDimensions
EnableMenuItem
SetScrollRange
SetRect
CreateIconIndirect
GetSystemMenu
ShowCaret
LoadIconA
TranslateMessage
LoadCursorA
GetSysColor
GetForegroundWindow
SetClipboardData
InvalidateRgn
GetSysColorBrush
AdjustWindowRectEx
PostMessageA
EnableWindow
RegisterClassExA
MapWindowPoints
MapDialogRect
GrayStringA
DrawIcon
GetMenuState
GetDCEx
EmptyClipboard
CheckDlgButton
IntersectRect
OffsetRect
GetFocus
SendMessageA
GetMenuItemID
MessageBoxA
MoveWindow
CreateMenu
DeferWindowPos
GetDesktopWindow
kernel32
GetConsoleOutputCP
QueryPerformanceCounter
SetHandleCount
IsDebuggerPresent
LCMapStringA
InterlockedExchange
OutputDebugStringA
TerminateProcess
InitializeCriticalSectionAndSpinCount
SetStdHandle
WideCharToMultiByte
ReadFile
SetConsoleCtrlHandler
HeapDestroy
CloseHandle
GetEnvironmentStrings
WriteConsoleW
GetStringTypeA
RtlUnwind
SetFilePointer
VirtualFree
GetOEMCP
GetModuleFileNameW
GetConsoleCP
GetCurrentProcessId
DebugBreak
VirtualAlloc
TlsSetValue
GetStdHandle
GetACP
ExitProcess
CompareStringA
HeapReAlloc
GetCPInfo
CompareStringW
SetLastError
GetCurrentProcess
GetConsoleMode
FreeEnvironmentStringsA
IsValidCodePage
TlsFree
HeapFree
GetModuleHandleW
GetTimeZoneInformation
MultiByteToWideChar
LocalFree
LoadLibraryA
GetTickCount
IsBadReadPtr
WriteFile
HeapCreate
GetDateFormatA
GetModuleHandleA
FreeEnvironmentStringsW
GetCurrentThreadId
GetStringTypeW
GetCommandLineA
SetUnhandledExceptionFilter
GetProcAddress
Sleep
GetEnvironmentStringsW
LCMapStringW
LoadLibraryW
HeapAlloc
CreateFileA
TlsGetValue
GetModuleFileNameA
DeleteCriticalSection
OutputDebugStringW
CreateMutexA
WaitForSingleObject
HeapValidate
GetStartupInfoA
GetFileType
VirtualQuery
SetEnvironmentVariableA
HeapSize
InterlockedDecrement
TlsAlloc
GetLocaleInfoA
EnterCriticalSection
InterlockedIncrement
WriteConsoleA
UnhandledExceptionFilter
GetLastError
GetTimeFormatA
RaiseException
LeaveCriticalSection
GetSystemTimeAsFileTime
FlushFileBuffers
shell32
ShellExecuteExW
ShellExecuteW
ord155
SHBrowseForFolderW
advapi32
InitializeSecurityDescriptor
RegOpenKeyExA
GetUserNameA
RegQueryValueA
RegCreateKeyA
CloseServiceHandle
RegCreateKeyExA
RegQueryValueExA
OpenServiceA
SetSecurityDescriptorDacl
RegSetValueA
RegEnumKeyA
RegDeleteKeyA
RegEnumValueA
RegOpenKeyA
RegDeleteValueA
RegCloseKey
RegSetValueExA
RegQueryInfoKeyA
SetFileSecurityA
RegEnumKeyExA
mfc42
ord1576
version
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 216KB - Virtual size: 213KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 508KB - Virtual size: 505KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ