T:\jjiZIlcq\iohuuyeSWOgBfj\pFainzRuH\oosdHlzeBe\RbIroti.pdb
Static task
static1
Behavioral task
behavioral1
Sample
60bb355d0cb169a745b835e454878eca_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
60bb355d0cb169a745b835e454878eca_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
60bb355d0cb169a745b835e454878eca_JaffaCakes118
-
Size
214KB
-
MD5
60bb355d0cb169a745b835e454878eca
-
SHA1
414e37a99dd59c9aa0067aa946c9858226e7b9da
-
SHA256
6ba3ce047b973e5493397e4958be67a0665e24fa2fd0bbd3149f182944113b42
-
SHA512
4d75d40c88685ec035903221ee9105ee4b0a8c58869e53478e5fd37c53366aff27edae3b2228e76cd1117bf2f3545232c9a2ffb162a7a468b99b3979ab792e3d
-
SSDEEP
3072:VKB1IJrn9AjzejFph0K8n0pNSVw12oq6BN4tCi9UPk7X3PsM+qg+Scl6Mp:M3j3K8n0fR17BWtlUPkbsM+F26K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 60bb355d0cb169a745b835e454878eca_JaffaCakes118
Files
-
60bb355d0cb169a745b835e454878eca_JaffaCakes118.exe windows:5 windows x86 arch:x86
bbea383df85005f09bf94543c60270e1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
RegisterHotKey
GetUserObjectInformationW
GetKeyNameTextW
CheckMenuItem
GetScrollInfo
TabbedTextOutW
GetDC
OpenIcon
SetScrollRange
GetShellWindow
ClientToScreen
SystemParametersInfoA
LoadStringW
GetDlgItemInt
EnableScrollBar
LoadBitmapW
GetPropW
DefWindowProcW
EndPaint
MapVirtualKeyA
GrayStringW
InternalGetWindowText
GetClassLongW
CopyRect
IsDialogMessageW
SetWindowRgn
TrackPopupMenu
SetCursorPos
wsprintfW
ScrollWindow
SystemParametersInfoW
DrawMenuBar
SetParent
AdjustWindowRect
TranslateAcceleratorA
gdi32
LineDDA
SetViewportExtEx
SetAbortProc
SetTextAlign
PolyBezier
TranslateCharsetInfo
GetTextExtentPointW
StretchDIBits
EnumFontFamiliesW
GetWindowOrgEx
CreateEllipticRgnIndirect
CreateFontA
SetBkMode
GetTextExtentExPointW
msvcrt
_controlfp
__set_app_type
iswctype
__p__fmode
wcstol
__p__commode
isalpha
fprintf
_amsg_exit
clock
_initterm
strrchr
fflush
_acmdln
exit
_ismbblead
_XcptFilter
wcsncmp
_exit
_cexit
__setusermatherr
__getmainargs
gets
setvbuf
comdlg32
ReplaceTextW
GetFileTitleW
comctl32
ImageList_LoadImageW
CreatePropertySheetPageW
ImageList_Remove
kernel32
PulseEvent
CallNamedPipeW
GetComputerNameExA
GetStdHandle
SetThreadPriority
SetFileAttributesW
SleepEx
GetExitCodeThread
GlobalAlloc
GetCurrentThreadId
GetOEMCP
IsDBCSLeadByte
lstrcpyW
LocalUnlock
CompareStringW
CreateWaitableTimerW
Exports
Exports
?CreateEventJUDhfjkldf@@YGKEPA_WG@Z
Sections
.text Size: 174KB - Virtual size: 174KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idat Size: 512B - Virtual size: 400B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.diag_x Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.div Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.diag_y Size: 512B - Virtual size: 84B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.imul Size: 512B - Virtual size: 262B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.plus Size: 1024B - Virtual size: 710B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.minus Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ