T:\ZTnjXxa\ZikGqpquS\PqhwMxm\qqRJoutPwsR.pdb
Static task
static1
Behavioral task
behavioral1
Sample
63ef7c136d0f28f6563df247a53d2032_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
63ef7c136d0f28f6563df247a53d2032_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
63ef7c136d0f28f6563df247a53d2032_JaffaCakes118
-
Size
69KB
-
MD5
63ef7c136d0f28f6563df247a53d2032
-
SHA1
54dca86efc7dace4290c8ce1f2920c673b6b387f
-
SHA256
2fed92545d082c70bdb3b2ba85662ea945e5edf16577047587aa1f2fe9c8dd0e
-
SHA512
190eaaf132fcb16ef5305d4b7b960e5d0dc707bb124553c1baa56bb601e3d52accc3648689187eeaace3a44d345badfe2fcf1eca8c858dda8e26f140a4ea897d
-
SSDEEP
1536:f1cUZIMgEqpsJnZRFIgDI7fGz1OI/Ro/e7nOXyEcjm:+yFspsJnPFIgErGt/Ro/WOjci
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 63ef7c136d0f28f6563df247a53d2032_JaffaCakes118
Files
-
63ef7c136d0f28f6563df247a53d2032_JaffaCakes118.exe windows:5 windows x86 arch:x86
d9e64043abc2868499073d4d26fe0a75
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
wcscmp
putchar
wcscat
isdigit
islower
_controlfp
gmtime
__set_app_type
getenv
wcstod
localtime
__p__fmode
__p__commode
fread
_amsg_exit
iswspace
_initterm
wcscspn
fseek
strncmp
wcschr
sprintf
isalpha
towlower
bsearch
_ismbblead
_XcptFilter
strrchr
_exit
isalnum
fgetc
toupper
strstr
atoi
strcpy
wcstombs
_cexit
rand
fclose
isxdigit
iswprint
__setusermatherr
isprint
strcoll
swscanf
__getmainargs
mbstowcs
comdlg32
ChooseColorW
PrintDlgW
GetFileTitleW
GetSaveFileNameW
GetOpenFileNameW
user32
TranslateMessage
wvsprintfW
IsWindowUnicode
DefWindowProcW
GetMenuCheckMarkDimensions
CreateIconIndirect
CharUpperBuffW
ClipCursor
SetClassLongW
ReleaseDC
SetMenuDefaultItem
SetMenu
CreatePopupMenu
RemoveMenu
FindWindowW
InsertMenuItemW
LoadBitmapW
MonitorFromRect
SendMessageA
ClientToScreen
InvalidateRgn
SetWindowTextA
SetWindowTextW
LoadAcceleratorsW
GetMenuStringA
AppendMenuA
GetSysColorBrush
EnumChildWindows
SetRectEmpty
OpenInputDesktop
SetScrollPos
SendMessageW
AppendMenuW
GetLastActivePopup
SetDlgItemTextA
RegisterWindowMessageA
GetClassInfoExA
SendDlgItemMessageW
CopyRect
ScrollWindow
GetUpdateRect
GetSystemMetrics
SendInput
ChildWindowFromPointEx
CreateWindowExA
WindowFromPoint
IsDlgButtonChecked
CreateDialogParamW
IsWindowEnabled
ChangeMenuW
TabbedTextOutW
CharToOemW
SetWindowLongW
ShowOwnedPopups
OffsetRect
InvertRect
ChildWindowFromPoint
GetMenu
MapDialogRect
GetCursorPos
HiliteMenuItem
GetClassInfoExW
mouse_event
GetDlgItemInt
SetPropW
CharPrevW
SetActiveWindow
LoadStringA
MoveWindow
MapWindowPoints
AdjustWindowRect
SetWindowPlacement
KillTimer
InvalidateRect
wvsprintfA
UpdateWindow
SetParent
GetClassLongA
SendDlgItemMessageA
TrackPopupMenu
GetWindowTextW
SystemParametersInfoW
CharNextW
GetCaretPos
FrameRect
SetWindowPos
DispatchMessageW
IsChild
CreateDialogIndirectParamW
RegisterClassExW
GetWindow
ScrollWindowEx
DrawStateA
IsDialogMessageW
LookupIconIdFromDirectory
IsCharAlphaW
LoadCursorA
ShowCursor
IsRectEmpty
MapVirtualKeyA
IsIconic
ShowScrollBar
GetAsyncKeyState
TrackPopupMenuEx
DialogBoxIndirectParamW
MessageBoxA
CharNextExA
PostThreadMessageW
GetWindowTextA
CreateAcceleratorTableW
ShowCaret
FindWindowA
CheckMenuItem
DefFrameProcW
DrawIcon
LoadCursorW
GetWindowLongW
CharUpperBuffA
GetDlgItemTextW
TranslateAcceleratorA
kernel32
FindClose
GetWindowsDirectoryW
WinExec
LocalLock
IsDBCSLeadByteEx
SetErrorMode
FormatMessageA
QueryPerformanceCounter
GetStringTypeExW
ResetEvent
GetFullPathNameA
ReleaseSemaphore
CreateMutexA
GetCommandLineW
LocalAlloc
VirtualAlloc
lstrlenW
GlobalLock
GlobalSize
GetCommTimeouts
HeapWalk
GetUserDefaultUILanguage
ResumeThread
lstrcpyW
LocalFree
HeapCreate
GetCurrentThread
GetShortPathNameW
CancelWaitableTimer
SetupComm
GetThreadLocale
CreateWaitableTimerW
VirtualProtect
GetTempPathW
SetThreadPriority
SetThreadLocale
CreateNamedPipeA
IsValidLocale
CreateNamedPipeW
SetThreadAffinityMask
UnhandledExceptionFilter
PulseEvent
LocalReAlloc
LocalUnlock
GlobalDeleteAtom
LoadLibraryA
CreateThread
LoadResource
GetTimeFormatA
WaitForSingleObjectEx
DeviceIoControl
LoadLibraryExW
CreateSemaphoreW
GetCommandLineA
WaitCommEvent
DuplicateHandle
Exports
Exports
?GetShiftAltInfo@@YGK_KHE:O
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.init Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.erts Size: 512B - Virtual size: 86B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wall Size: 512B - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.info Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.udata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ