C:\Uvywyq.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6169dfd8afcb2a8d1f9b113908dbb6cf_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6169dfd8afcb2a8d1f9b113908dbb6cf_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
6169dfd8afcb2a8d1f9b113908dbb6cf_JaffaCakes118
-
Size
128KB
-
MD5
6169dfd8afcb2a8d1f9b113908dbb6cf
-
SHA1
b48bde311fafed33c10a9e5d1c1a784ceadcf493
-
SHA256
d19d4b32f6ac51533b60bad4ac98da91ffdb50eac3dfc18ac35f71773b43dcf1
-
SHA512
0ecdeb6c0b8d498ee86047fac657c5a4ebca7c874dac215a63f5f081c4f26c6124e6c544be6d1feb5cd62904b987598db1e9da6890f43b3b958dfca6ae0c53cc
-
SSDEEP
3072:/gUt8tl0BWo7qjejQI1MJRTaYXaYLQmH8TDb/m+1:IUtSSMo7qaNyRTaw3oF1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6169dfd8afcb2a8d1f9b113908dbb6cf_JaffaCakes118
Files
-
6169dfd8afcb2a8d1f9b113908dbb6cf_JaffaCakes118.exe windows:4 windows x86 arch:x86
8f1a3b525c8ac4ddc0a1589ee6c39b86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreatePipe
GlobalFree
GlobalAlloc
GetLocaleInfoA
GlobalLock
CreateEventA
FileTimeToLocalFileTime
GetVersion
GetLocalTime
CreateFileA
GetProfileStringW
VirtualProtect
CloseHandle
CreateToolhelp32Snapshot
Process32First
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
LCMapStringW
LCMapStringA
GetSystemInfo
VirtualQuery
InterlockedExchange
RtlUnwind
LoadLibraryA
FlushFileBuffers
SetStdHandle
GetCPInfo
GetOEMCP
GetACP
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
GetStartupInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
HeapFree
HeapAlloc
GetModuleHandleA
GetCommandLineA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetLastError
ReadFile
WriteFile
ExitProcess
GetProcAddress
TerminateProcess
GetCurrentProcess
SetFilePointer
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
SetEndOfFile
user32
ScreenToClient
SystemParametersInfoA
FrameRect
ClientToScreen
SetFocus
RegisterClassExA
GetKeyNameTextA
GetWindowTextLengthA
GetClassInfoExA
CallWindowProcA
GetMessageA
GetCursorPos
GetFocus
AppendMenuA
CheckMenuRadioItem
LoadImageA
DrawIcon
DispatchMessageA
IsWindowEnabled
GetClassNameA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
GetJobA
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ