c:\savxp\build\Installer\Modules\DisplayMessage\Release\DisplayMessage.pdb
Static task
static1
Behavioral task
behavioral1
Sample
654edc3283c4509e4191c49d7e124406_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
654edc3283c4509e4191c49d7e124406_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
654edc3283c4509e4191c49d7e124406_JaffaCakes118
-
Size
165KB
-
MD5
654edc3283c4509e4191c49d7e124406
-
SHA1
f7b9ead391a68853263fd998e6fae5439940692a
-
SHA256
d0c5a02daaa2a43ee995631ce98b39bbc03b26e68cfeba35f6e591abe5e3d345
-
SHA512
192c7f62b8cc53d7ec57f1ff99517affbf3c10d63c0059cd96ed8808d8ccf3f6e96c30d813548182a3897b06432e00965a3acf62891e465ad8af41c53a78aed4
-
SSDEEP
3072:o0GfFriGz3FDqpkWXDR+jGUtgIl4WpHSKlyXaiXxOGwpn6N1fD:NIiGz3FOp9XDCGFWpHSy2XxOPns1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 654edc3283c4509e4191c49d7e124406_JaffaCakes118
Files
-
654edc3283c4509e4191c49d7e124406_JaffaCakes118.exe windows:4 windows x86 arch:x86
27f2614106feb5465ce649a4be143c31
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetVersionExW
GetLastError
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
WideCharToMultiByte
lstrlenW
GetLocalTime
GetTempPathW
GetThreadLocale
DeleteFileA
CloseHandle
CreateFileW
FreeLibrary
GetProcAddress
LoadLibraryW
RaiseException
InitializeCriticalSection
DeleteCriticalSection
GetLocaleInfoA
GetACP
GetTempPathA
InterlockedExchange
GetOEMCP
SetEndOfFile
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
ExitProcess
RtlUnwind
GetModuleHandleA
GetStartupInfoW
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetCPInfo
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
SetUnhandledExceptionFilter
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
WriteFile
FlushFileBuffers
TerminateProcess
GetCurrentProcess
SetFilePointer
VirtualQuery
GetStdHandle
UnhandledExceptionFilter
GetModuleFileNameW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
VirtualProtect
GetSystemInfo
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
IsBadReadPtr
IsBadCodePtr
LoadLibraryA
SetStdHandle
ReadFile
GetLocaleInfoW
CreateFileA
advapi32
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
ole32
CoUninitialize
CoInitializeSecurity
CoInitializeEx
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ