Y:\vbOAiQuaRf\wmGAKHWiamv\HxtpiYJpwk.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5b83a4620dfc7ce4a90b137bb14efdb4_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5b83a4620dfc7ce4a90b137bb14efdb4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5b83a4620dfc7ce4a90b137bb14efdb4_JaffaCakes118
-
Size
216KB
-
MD5
5b83a4620dfc7ce4a90b137bb14efdb4
-
SHA1
ca32447e1001f8723482ac60729be658f9d6299b
-
SHA256
59dee6ccfcabfa828884fde30c331a6a3a0cb679230800801a348fdc1687cf5a
-
SHA512
6d8e3532bfacb495e626089e8fc0dc8a0c3655c9ba0580366fbfb4df536e12df11f1d98a1ed7b9e2837fcaffe1b8d8ab33e22e9b1547baff29e9454e69e35af7
-
SSDEEP
6144:avWq3Zm5T0CwV1IX5TlQz6nN9HFL5o1ns:mzxJc5TlQzabFK1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5b83a4620dfc7ce4a90b137bb14efdb4_JaffaCakes118
Files
-
5b83a4620dfc7ce4a90b137bb14efdb4_JaffaCakes118.exe windows:5 windows x86 arch:x86
82e3628ade65f0707473fc974baa4283
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
GetDlgItemTextW
CreateAcceleratorTableW
DispatchMessageW
ModifyMenuW
SetScrollRange
ActivateKeyboardLayout
InvalidateRect
DialogBoxParamW
GetShellWindow
PostQuitMessage
InvertRect
DestroyCaret
GetUpdateRect
LoadMenuW
DefDlgProcW
CharPrevA
SetCursorPos
RegisterClassA
GetSystemMenu
SetWindowLongA
MessageBoxExW
SetLastErrorEx
TileWindows
DrawEdge
SendDlgItemMessageA
UnionRect
ChildWindowFromPointEx
SendNotifyMessageW
IsCharLowerA
HideCaret
DrawTextExW
GetMenuCheckMarkDimensions
InsertMenuA
GetCaretPos
SetForegroundWindow
msvcrt
_controlfp
__set_app_type
swscanf
fflush
__p__fmode
wcsrchr
wcsstr
remove
__p__commode
_amsg_exit
_initterm
_acmdln
setvbuf
localtime
exit
_ismbblead
fwrite
_XcptFilter
_exit
putc
_cexit
strchr
__setusermatherr
__getmainargs
kernel32
lstrcpyW
GetSystemDefaultUILanguage
GlobalFindAtomW
RemoveDirectoryW
LockResource
ResetEvent
DeleteFileW
GetComputerNameExW
FlushFileBuffers
GetModuleHandleW
GlobalCompact
CreateFileA
GetFullPathNameW
ReleaseSemaphore
SetEndOfFile
WaitForSingleObject
WaitForMultipleObjectsEx
GetSystemTimeAsFileTime
advapi32
LookupPrivilegeValueW
gdi32
SetROP2
TranslateCharsetInfo
GetDIBits
GetTextExtentExPointW
CreateHatchBrush
SelectClipRgn
FlattenPath
CreatePalette
CreatePolygonRgn
StartDocW
CreateBrushIndirect
CreateRectRgn
FillPath
GetClipBox
SetViewportOrgEx
SaveDC
SetBkColor
Exports
Exports
?TryEnterCriticalSectionJKDJHLJHKDljfjhl@@YGKEPA_WG@Z
Sections
.text Size: 180KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.diag_x Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idat Size: 512B - Virtual size: 400B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.div Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.diag_y Size: 512B - Virtual size: 65B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.plus Size: 1024B - Virtual size: 805B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.minus Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ