U:\BfimhTwdaO\lqqJGCUQuvb\nwibRzw.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5fdd138b429a0f78a7d90b3bf7a1e141_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5fdd138b429a0f78a7d90b3bf7a1e141_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5fdd138b429a0f78a7d90b3bf7a1e141_JaffaCakes118
-
Size
57KB
-
MD5
5fdd138b429a0f78a7d90b3bf7a1e141
-
SHA1
14555a266a5e7c154ee3e04d0ee2ed3a1a2fc4c0
-
SHA256
8140b7df1d6eb8340ec8ccc2dac87af0b3bd5633c29ebe45ceb7cd536b73944a
-
SHA512
edd6a089025a3593b1ebc34ecebb8270a6a46dfa1cd4ad0958ad601652a0af9357f878e2e05ace818755200e497a4b51cb5e97f0c93a487a2bc49de22e1ff1a1
-
SSDEEP
1536:legUezzQeXyQOjODl6q+njb2Q0NC6rRCUCnikD:lHf0eiXODl6X32RME7GikD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5fdd138b429a0f78a7d90b3bf7a1e141_JaffaCakes118
Files
-
5fdd138b429a0f78a7d90b3bf7a1e141_JaffaCakes118.exe windows:5 windows x86 arch:x86
8754668a9f8fea813cd7e5b3672c5a59
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
iswctype
iswalpha
islower
malloc
__set_app_type
towupper
__p__fmode
__p__commode
strerror
_amsg_exit
isdigit
fflush
_initterm
_ismbblead
mbstowcs
iswspace
_XcptFilter
bsearch
isupper
vsprintf
towlower
strtok
_exit
time
wcstok
mktime
isprint
strtoul
wcspbrk
memset
strcoll
floor
exit
sscanf
_cexit
fseek
clearerr
fwrite
iswxdigit
strrchr
__setusermatherr
realloc
wcsrchr
fread
printf
__getmainargs
isxdigit
comctl32
CreatePropertySheetPageW
CreateStatusWindowW
CreateToolbarEx
ImageList_AddMasked
ImageList_Destroy
DestroyPropertySheetPage
shlwapi
StrToIntW
user32
FindWindowExA
SetPropW
IsWindowUnicode
DrawIcon
DestroyCaret
GetMenuState
LoadIconW
PostMessageA
SetWindowPlacement
GetFocus
IsChild
SetCursorPos
DialogBoxParamA
GetCursorPos
SwitchToThisWindow
LoadMenuA
ModifyMenuW
SetWindowRgn
RemoveMenu
ShowOwnedPopups
GetAsyncKeyState
TranslateAcceleratorA
EnableWindow
SystemParametersInfoW
RemovePropW
LoadImageA
AdjustWindowRectEx
GetMenuCheckMarkDimensions
CreateDialogIndirectParamW
GetScrollRange
MonitorFromPoint
SendDlgItemMessageW
GetMessageA
GetIconInfo
LoadBitmapA
InvalidateRgn
GetCaretBlinkTime
RegisterWindowMessageA
IsWindow
ClientToScreen
WaitForInputIdle
LoadCursorW
CharToOemA
GetMessageTime
SetScrollRange
EndPaint
InsertMenuA
wsprintfW
GetUserObjectInformationW
SetCursor
MapVirtualKeyW
DrawIconEx
MessageBoxExA
OffsetRect
SetForegroundWindow
LoadCursorA
GetWindowRect
GetShellWindow
ShowWindowAsync
GetUserObjectInformationA
DialogBoxIndirectParamW
MessageBoxA
FillRect
SendMessageTimeoutA
PeekMessageA
SetWindowTextW
SetDlgItemInt
SendDlgItemMessageA
UnloadKeyboardLayout
CascadeWindows
GetMenuItemRect
ScrollWindowEx
CharUpperW
CharLowerA
InvalidateRect
ValidateRect
SetParent
PostMessageW
CreateIconIndirect
OpenInputDesktop
DrawFrameControl
RedrawWindow
GetKeyboardLayoutNameW
ShowWindow
IsCharAlphaW
GetClassInfoExW
GetWindow
CharToOemBuffA
SetDlgItemTextW
GetWindowModuleFileNameW
DefFrameProcW
AdjustWindowRect
GetMonitorInfoW
GetDlgCtrlID
InternalGetWindowText
GetGUIThreadInfo
InvertRect
CallWindowProcA
VkKeyScanW
AppendMenuW
GetTopWindow
CreateWindowExA
CopyImage
GetClassNameW
ToUnicodeEx
WaitMessage
GetUpdateRect
GetKeyNameTextW
SetScrollInfo
SendInput
GetScrollInfo
ClipCursor
GetMessageW
IsZoomed
InsertMenuW
InSendMessage
CheckMenuItem
EnableMenuItem
CharNextExA
InflateRect
LoadImageW
CreateIconFromResource
comdlg32
PageSetupDlgW
PrintDlgExW
ChooseColorW
GetOpenFileNameA
GetOpenFileNameW
kernel32
HeapAlloc
CreateNamedPipeW
lstrlenW
GetShortPathNameA
FindNextFileW
ReadFile
AddAtomW
CreateFileA
GlobalFindAtomW
LCMapStringA
LockResource
GetOEMCP
SetEndOfFile
OpenEventW
GetCommTimeouts
GetProcessHeap
GetCurrentDirectoryW
RemoveDirectoryW
SetFileApisToOEM
SetThreadPriority
ReleaseMutex
CreateWaitableTimerA
GetSystemWindowsDirectoryW
GetComputerNameExW
GetWindowsDirectoryA
OpenEventA
SetNamedPipeHandleState
CreatePipe
GlobalSize
GetLastError
CallNamedPipeW
SetThreadExecutionState
GetPriorityClass
GlobalHandle
GetSystemDirectoryA
GlobalAddAtomW
SetLocalTime
FileTimeToSystemTime
SetSystemTime
HeapFree
IsValidLanguageGroup
CopyFileW
GetVersionExA
CreateNamedPipeA
GetModuleHandleA
LoadLibraryExW
GetCurrentThreadId
WaitForSingleObject
GlobalLock
MapViewOfFile
GetFileAttributesExW
GetFileType
IsDBCSLeadByte
CreateMailslotW
Exports
Exports
?GenericOutputInfoYSUh@@YGK_KHE[D
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ