excel.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5fe759fd63eabda78765fae0e71d695d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5fe759fd63eabda78765fae0e71d695d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5fe759fd63eabda78765fae0e71d695d_JaffaCakes118
-
Size
36KB
-
MD5
5fe759fd63eabda78765fae0e71d695d
-
SHA1
3557124ad02f2384a3302c5aa062e9904be802d7
-
SHA256
c2d176bf503d2e09341bec5f99cd8e63020adb703cda66681735b122fd862375
-
SHA512
186605188f34bb464cbedb9d68a28d723c8eda158a5c07b6a4021c8a556094ee5a5b97f257d46530b04c9754ad999003627177f809edbd212d692729af705f18
-
SSDEEP
768:9l6XUXEO7fE8zaEWEqEbET5pcGlO/qR13CcbYP8U:9l6XsD7mEWEqEbET5tMkfYP8U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5fe759fd63eabda78765fae0e71d695d_JaffaCakes118
Files
-
5fe759fd63eabda78765fae0e71d695d_JaffaCakes118.exe windows:4 windows x86 arch:x86
818f1fbcebdb7a5abf3dc7abeb6af66a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ExitProcess
FormatMessageA
GetLastError
SetLastError
VirtualAlloc
CloseHandle
MapViewOfFile
CreateFileMappingA
VirtualFree
GetProcAddress
VirtualProtect
LoadLibraryA
GetModuleHandleA
GetModuleFileNameW
UnmapViewOfFile
lstrlenW
lstrcpyW
HeapFree
lstrcpynW
GetFullPathNameW
SetEnvironmentVariableW
HeapAlloc
GetProcessHeap
GetFileSize
ReadFile
SetFilePointer
CreateFileW
WideCharToMultiByte
GetEnvironmentVariableW
GetVersion
lstrcmpiW
FreeLibrary
LoadLibraryW
user32
wsprintfW
MessageBoxA
Exports
Exports
DllGetLCID
MdCallBack
_LPenHelper
Sections
.text Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.res Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 132B - Virtual size: 9.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE