W:\uPvzpxqq\mSqmTijk\foUwsndhuApBx\qalXpTmttE.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5d669d6f22cb7926ed4debd4577ebe1d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5d669d6f22cb7926ed4debd4577ebe1d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5d669d6f22cb7926ed4debd4577ebe1d_JaffaCakes118
-
Size
37KB
-
MD5
5d669d6f22cb7926ed4debd4577ebe1d
-
SHA1
cc66ce27d41d7d0198a25399933971adcbe02ee9
-
SHA256
cc78c6fa185afa95f5dbcbbd7c87adbadde28e29c057ee7307a4302a766e79a7
-
SHA512
f7a322ee6e5dc6ac4026ded821abaaa184ba351362a0a30e6b5f62836d3e5f32e94c58dada131602e97beeab93e8d7a6f9e1868979cd74fe353479762b04f6a9
-
SSDEEP
768:ZaX6CoZysbmQHrkFiXcSF/+SsKMhP0Ws3n/XmQUSAEB5j2yiCLC7XOuDL8SsSOcU:Za3gyHMXTGSEK2QhJFm7XKcU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5d669d6f22cb7926ed4debd4577ebe1d_JaffaCakes118
Files
-
5d669d6f22cb7926ed4debd4577ebe1d_JaffaCakes118.exe windows:5 windows x86 arch:x86
3cd8174bd993909a216e75b1587662f8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
__set_app_type
system
__p__fmode
__p__commode
setlocale
_amsg_exit
_initterm
memset
_ismbblead
_XcptFilter
_exit
_cexit
__setusermatherr
__getmainargs
iswalpha
kernel32
LoadLibraryExA
lstrcmpiW
lstrlenA
SetThreadPriority
GetModuleFileNameA
GetHandleInformation
LoadLibraryA
GetShortPathNameW
CreateWaitableTimerW
GetThreadLocale
shlwapi
ChrCmpIW
UrlGetLocationW
user32
wsprintfW
GetDC
TabbedTextOutW
CreateDialogParamW
GetDlgItemTextW
RegisterHotKey
GetClientRect
CopyImage
gdi32
SetMapMode
ResizePalette
ScaleViewportExtEx
GetCurrentObject
UnrealizeObject
Exports
Exports
?CreateDlgMessage@@YGHPAXPADK|U
Sections
.text Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idir Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE