D:\zrMtsJAmZvqbP\JtpicezirP\oyfvprZrn.pdb
Static task
static1
Behavioral task
behavioral1
Sample
628433f11eac954b1056f5db3a94202e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
628433f11eac954b1056f5db3a94202e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
628433f11eac954b1056f5db3a94202e_JaffaCakes118
-
Size
113KB
-
MD5
628433f11eac954b1056f5db3a94202e
-
SHA1
c57f4c02847a16e056b0c4888cba439eda693458
-
SHA256
15b920cd04e5457335cd5f98ed0c15dfdf7e7f2704f0cf5557ce91918e6d08d3
-
SHA512
1007407afdc97804aa40f2d829339d03763cfad5ed6d3100508f71654a9d1628025b0a01100eccbe044d447964b3c70681bf892a92fdeeb884e33913ba60d4e8
-
SSDEEP
1536:G1s010VvBxM2PTq5D1jFQP97Z0ITwaqnirEE0YZR2CM6fe0vjxTLXBXVmAtT8Ka9:ZVV1PT81qVNzw0rEE02wB6fbFaM+tj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 628433f11eac954b1056f5db3a94202e_JaffaCakes118
Files
-
628433f11eac954b1056f5db3a94202e_JaffaCakes118.exe windows:5 windows x86 arch:x86
bb9f8b927e02349e15af4fb073481f42
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathIsUNCA
msvcrt
isspace
isprint
clearerr
remove
_controlfp
realloc
strtol
wcstol
__set_app_type
sprintf
isdigit
iswctype
iswdigit
__p__fmode
iswxdigit
wcstod
malloc
__p__commode
memset
strspn
_amsg_exit
fread
_initterm
_ismbblead
printf
strrchr
getenv
puts
localtime
_XcptFilter
towlower
_exit
atoi
free
wcsncpy
wcsstr
_cexit
clock
setvbuf
strerror
swprintf
__setusermatherr
tolower
vsprintf
ungetc
mktime
strcpy
wcsncmp
__getmainargs
kernel32
SetCommState
GetProcAddress
GetVersion
CompareStringA
GetFileSize
ReleaseMutex
TransactNamedPipe
GetCommProperties
FindClose
lstrcpyA
GetThreadLocale
WaitForSingleObject
VerSetConditionMask
CreateDirectoryA
HeapFree
GlobalFree
CreatePipe
SetCurrentDirectoryW
GlobalDeleteAtom
CreateSemaphoreA
GetStartupInfoA
GetSystemDefaultLangID
SetThreadPriority
WinExec
CloseHandle
OpenFileMappingA
GetCurrentThreadId
FlushViewOfFile
SetUnhandledExceptionFilter
IsBadCodePtr
HeapReAlloc
GetExitCodeThread
GetLocalTime
GetFileAttributesW
GetCommandLineW
GlobalGetAtomNameA
GetFileInformationByHandle
SetPriorityClass
GetLongPathNameW
LocalFree
WriteFile
DeviceIoControl
ExitThread
IsBadReadPtr
CreateFileW
SetThreadLocale
SuspendThread
AreFileApisANSI
GetBinaryTypeW
GetLocaleInfoA
SetCommTimeouts
SetCommBreak
GlobalHandle
SetFilePointer
user32
SetMenu
LoadImageW
GetSysColorBrush
CharNextA
AppendMenuW
DispatchMessageW
IsWindowUnicode
EnableMenuItem
GetMenuStringW
CreateWindowExA
SetSysColors
GetDlgItemTextA
ExitWindowsEx
CharNextExA
GetClipCursor
HiliteMenuItem
CharNextW
InternalGetWindowText
CharToOemBuffA
wsprintfA
CreateDialogParamA
SystemParametersInfoA
LoadBitmapA
MessageBoxExW
GetDoubleClickTime
SetPropW
EndDialog
SetLastErrorEx
GetDC
CallWindowProcW
MapVirtualKeyA
EnumWindows
SetRectEmpty
DestroyWindow
ShowWindow
keybd_event
EndPaint
IsRectEmpty
DrawStateA
RemovePropW
GetScrollInfo
InvalidateRect
GetSysColor
DefWindowProcA
ModifyMenuW
GetClassLongW
GetWindowLongW
CreateIconIndirect
SetWindowLongA
SetUserObjectInformationW
ChildWindowFromPointEx
GetMenuItemCount
GetLastActivePopup
UpdateWindow
GetMenu
CharLowerW
SetCursor
LoadMenuW
DialogBoxParamW
SetMenuItemInfoW
GetUserObjectInformationA
GetCursorPos
RegisterWindowMessageW
RegisterClassExA
ChangeMenuW
GetParent
CreateCursor
GetKeyState
GetNextDlgGroupItem
GetFocus
RegisterClassA
CharLowerA
GetDlgCtrlID
wsprintfW
GetMenuItemRect
SetScrollRange
ShowCaret
DrawTextExW
HideCaret
GetMessageTime
DeferWindowPos
GetDlgItemTextW
OemToCharA
MessageBoxA
GetWindowTextLengthW
FillRect
MoveWindow
CharToOemA
OemToCharBuffA
DefWindowProcW
GetMessagePos
AttachThreadInput
SendMessageTimeoutW
GetUserObjectInformationW
PeekMessageA
CheckRadioButton
CharLowerBuffW
ShowCursor
SetCaretPos
GetSubMenu
MonitorFromRect
OpenDesktopW
DestroyAcceleratorTable
IsDlgButtonChecked
ClientToScreen
CharPrevW
DestroyIcon
InvertRect
DispatchMessageA
CharUpperA
IsCharAlphaW
AdjustWindowRect
SetClassLongW
IsChild
GetClassLongA
BringWindowToTop
GetWindowLongA
GetMenuStringA
CallWindowProcA
SetWindowTextA
IsZoomed
DialogBoxIndirectParamA
SystemParametersInfoW
Exports
Exports
?ForwardControlItem@@YGK_KK:O
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ips1 Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ips2 Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.read Size: 1024B - Virtual size: 320KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ips3 Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ips4 Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ