f:\creo\emqeb.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5b4056b8c9efd200571c520b8f380a8f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5b4056b8c9efd200571c520b8f380a8f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5b4056b8c9efd200571c520b8f380a8f_JaffaCakes118
-
Size
448KB
-
MD5
5b4056b8c9efd200571c520b8f380a8f
-
SHA1
a556300e3278eb59edbbb9916ed8545c57ad899e
-
SHA256
962770ad424016b2bf5a8340a3bf107eaae75f5ff67f6437804198055c814b40
-
SHA512
63d41acb1e66135265f162afda8512a31223766e5335a3e98d359830386f5728a1c055d1ab84933d1fc7abe217bb3586072af2ac914ee1df7563a443daf13dcc
-
SSDEEP
6144:J84GC2wUwXVfdfI8Vz0r4J8SqX7wR74xp4u0CzRFuDLKpesCVrWIYzkzTK5O:O4n1ppI8J0iawlallLEnsCVMqU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5b4056b8c9efd200571c520b8f380a8f_JaffaCakes118
Files
-
5b4056b8c9efd200571c520b8f380a8f_JaffaCakes118.exe windows:4 windows x86 arch:x86
c5670ba1ab31164f23cb6df836173d50
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegOpenKeyExA
RegCreateKeyExW
OpenProcessToken
RegSetValueExA
RegCloseKey
CloseServiceHandle
RegCreateKeyExA
RegOpenKeyExW
QueryServiceStatus
RegQueryValueExA
SetServiceStatus
InitializeSecurityDescriptor
comctl32
InitCommonControlsEx
ord17
ImageList_Add
ImageList_LoadImageA
_TrackMouseEvent
ole32
OleIsCurrentClipboard
WriteClassStm
CoDisconnectObject
OleDestroyMenuDescriptor
OleTranslateAccelerator
OleCreateFromFile
OleCreateLinkToFile
CoLockObjectExternal
OleSave
StringFromGUID2
OleCreate
OleGetIconOfClass
CreateStreamOnHGlobal
OleCreateLinkFromData
CoRegisterMessageFilter
ReleaseStgMedium
IsAccelerator
OleSetMenuDescriptor
OleFlushClipboard
CLSIDFromString
OleUninitialize
OleCreateMenuDescriptor
OleSetContainedObject
oleaut32
LoadTypeLi
user32
LoadMenuA
DispatchMessageA
UnregisterClassA
DefWindowProcA
IsWindow
LoadBitmapA
PeekMessageA
wsprintfA
SetWindowContextHelpId
SetDlgItemTextA
IsIconic
GetClientRect
SetMenuItemBitmaps
DeferWindowPos
CreateWindowExA
RedrawWindow
SetWindowRgn
GetDesktopWindow
ReuseDDElParam
CallWindowProcA
CreateAcceleratorTableA
CreateCaret
LoadImageA
SetParent
GetSystemMenu
GetKeyState
EnableMenuItem
TrackPopupMenu
PostMessageA
GetParent
BeginDeferWindowPos
InvalidateRgn
GetMenuItemCount
DrawFocusRect
GetDCEx
GetMessageA
DrawTextA
ReleaseDC
SetTimer
ScreenToClient
PtInRect
MoveWindow
GetActiveWindow
SetScrollPos
CloseClipboard
EndDialog
SystemParametersInfoA
SetWindowPos
RegisterClipboardFormatA
GetClassInfoA
GetWindowPlacement
InflateRect
KillTimer
EqualRect
IsDlgButtonChecked
LockWindowUpdate
AdjustWindowRectEx
EndPaint
WindowFromPoint
GetWindowRect
SetCapture
GetCaretPos
GetDC
AppendMenuA
DestroyAcceleratorTable
DrawIconEx
EndDeferWindowPos
MessageBeep
GetWindowLongA
ReleaseCapture
GetMenu
GetAsyncKeyState
RegisterClassA
GetForegroundWindow
SetRect
EnumChildWindows
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
ModifyMenuA
SetCursor
IsChild
IsRectEmpty
GetWindowDC
SetActiveWindow
DestroyWindow
GetClassLongA
LoadAcceleratorsA
CreatePopupMenu
LoadCursorA
OffsetRect
GetMenuItemInfoA
DrawIcon
DestroyIcon
HideCaret
UnpackDDElParam
SetScrollRange
DrawMenuBar
GetSystemMetrics
GetMenuState
ShowWindow
GetFocus
DrawFrameControl
RemoveMenu
GetSubMenu
BeginPaint
MapWindowPoints
GetNextDlgTabItem
GetIconInfo
SetWindowLongA
SetFocus
WinHelpA
GrayStringA
MessageBoxA
ValidateRect
LoadStringA
GetWindow
SetRectEmpty
FillRect
GetClipboardFormatNameA
IsMenu
CopyRect
DestroyMenu
GetSysColorBrush
DestroyCursor
CheckMenuItem
RegisterClassExA
GetTabbedTextExtentA
LoadIconA
TranslateAcceleratorA
GetWindowTextA
GetWindowTextLengthA
GetCursorPos
gdi32
SetStretchBltMode
CreateDIBPatternBrushPt
CreateHalftonePalette
RestoreDC
BitBlt
PolyDraw
SetBrushOrgEx
GetGlyphOutlineA
EnumMetaFile
GetNearestPaletteIndex
CombineRgn
DeleteDC
SetPaletteEntries
AbortDoc
GetObjectA
SetViewportOrgEx
GetBoundsRect
CreateFontA
SetPixelV
CloseFigure
SetPixel
GetStockObject
SelectClipPath
CreatePalette
PolyPolyline
RectInRegion
PolylineTo
GetTextFaceA
PtVisible
GetTextExtentPoint32A
Polyline
UnrealizeObject
GetCurrentObject
MoveToEx
SetColorAdjustment
GetTextAlign
GetTextColor
LPtoDP
SetTextColor
GetArcDirection
GetPath
SelectClipRgn
Polygon
PlayMetaFileRecord
SetBkMode
GetDeviceCaps
ArcTo
CreateDCA
SaveDC
DeleteObject
SetArcDirection
CreateICA
PolyBezier
SetMapperFlags
CreateDIBitmap
SetTextAlign
StrokePath
RectVisible
FlattenPath
CreateBrushIndirect
GetPixel
ExtSelectClipRgn
ExtTextOutA
CreatePen
SelectObject
kernel32
LoadLibraryA
SetEnvironmentVariableA
GetACP
VirtualFree
GetDriveTypeA
CompareStringW
DeviceIoControl
SetStdHandle
GetVersionExA
HeapFree
DeleteCriticalSection
RaiseException
CreateThread
HeapReAlloc
LCMapStringA
FreeLibrary
GetEnvironmentStringsW
GlobalUnlock
WideCharToMultiByte
RtlUnwind
GetLastError
GetStartupInfoA
IsBadCodePtr
TlsSetValue
GetFileTime
InterlockedIncrement
FreeEnvironmentStringsW
lstrcmpA
CreateMutexA
HeapCreate
TlsFree
GetProcAddress
WritePrivateProfileStringA
GetModuleHandleA
SetEvent
VirtualAlloc
GetSystemInfo
FindResourceA
GlobalFindAtomA
TerminateThread
InterlockedDecrement
GlobalAddAtomA
GetOEMCP
LCMapStringW
GlobalAlloc
FreeEnvironmentStringsA
InterlockedExchange
SetFilePointer
CopyFileA
GetCPInfo
FindNextFileA
GetLocalTime
GlobalReAlloc
SuspendThread
GetTickCount
QueryPerformanceCounter
GetVersion
TlsAlloc
SetHandleCount
WaitForSingleObject
SetUnhandledExceptionFilter
GetStdHandle
GetProfileStringA
InitializeCriticalSection
SearchPathA
LockFile
ResumeThread
IsValidLocale
HeapDestroy
GetFileType
GetExitCodeThread
GetModuleFileNameW
SetFileTime
LocalAlloc
GlobalFree
GetShortPathNameA
GetWindowsDirectoryA
GlobalHandle
LoadResource
WriteFile
GetTempPathA
SetLastError
FindFirstFileA
ReadFile
CompareStringA
SizeofResource
GetSystemTime
GlobalGetAtomNameA
UnlockFile
GetCurrentProcess
GetDateFormatA
GetDiskFreeSpaceA
GetCurrentThread
FlushFileBuffers
ExitProcess
CreateSemaphoreA
GetEnvironmentStrings
VirtualQuery
SystemTimeToFileTime
HeapAlloc
MultiByteToWideChar
EnterCriticalSection
OpenProcess
LeaveCriticalSection
GetFullPathNameA
GetStringTypeW
MapViewOfFile
GetFileInformationByHandle
GetStringTypeA
GetThreadLocale
GetCommandLineA
lstrlenA
lstrcpyA
lstrlenW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTimeZoneInformation
TerminateProcess
GetLocaleInfoA
CloseHandle
GetFileAttributesA
TlsGetValue
SetThreadPriority
GetCurrentThreadId
GlobalSize
LoadLibraryExA
GetModuleFileNameA
DeleteFileA
UnhandledExceptionFilter
CreateEventA
Sections
.text Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 253KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ