W:\aROeGgXagq\sfNgUvseaDBg\NZTHbqhMzh\tUwUpyk\zyuGlwLFsz.pdb
Static task
static1
Behavioral task
behavioral1
Sample
641b104455aae00acee23b60ac548d90_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
641b104455aae00acee23b60ac548d90_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
641b104455aae00acee23b60ac548d90_JaffaCakes118
-
Size
224KB
-
MD5
641b104455aae00acee23b60ac548d90
-
SHA1
752d47d1d8d5bb3b0ef42cccd7fa354e2c29871b
-
SHA256
c649d2bc36c5bc27de82f6942739458a6701847c674b23b05459095f492b8470
-
SHA512
81c20e2df0bdb9145d6058dd3efd25d6c3f65ed6a98fede9aac6a7f49818a1c9d4486d83650f30ce48fc8f441788b30ff5d86359d9c88ff7a6e547240b1ae12d
-
SSDEEP
6144:Vj1OKep9rJpgT8lLNH4emZYDQsx84tuj7Eninj1:VjNefJpg4lLNH4e2YDU4tuPEnA1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 641b104455aae00acee23b60ac548d90_JaffaCakes118
Files
-
641b104455aae00acee23b60ac548d90_JaffaCakes118.dll windows:5 windows x86 arch:x86
fed20291988497adce2ff0e65e5be676
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_controlfp
malloc
__set_app_type
__p__fmode
__p__commode
atoi
wcsncmp
wcscpy
fflush
strcoll
atol
calloc
_amsg_exit
clock
remove
wcspbrk
_initterm
isalnum
_acmdln
getc
strpbrk
exit
strrchr
strstr
mktime
perror
mbstowcs
localtime
isupper
_ismbblead
_XcptFilter
_exit
_cexit
toupper
__setusermatherr
__getmainargs
putc
fgetc
bsearch
user32
DefFrameProcW
GetDialogBaseUnits
ShowOwnedPopups
OemToCharA
MonitorFromRect
PeekMessageW
GetWindow
EndPaint
SetDlgItemTextW
CascadeWindows
DialogBoxIndirectParamW
RegisterClassW
IsIconic
DispatchMessageA
SwitchToThisWindow
LoadImageA
GetWindowTextW
CharToOemW
RemoveMenu
CheckMenuItem
CreateWindowExW
GetPropW
EnumThreadWindows
GetMonitorInfoW
SendDlgItemMessageW
UnregisterClassA
SetMenuDefaultItem
keybd_event
IsCharUpperA
MessageBoxW
LockWindowUpdate
DrawTextA
wvsprintfA
PostThreadMessageA
EndTask
SendMessageTimeoutW
CopyAcceleratorTableW
LoadBitmapW
TileWindows
SendNotifyMessageW
MonitorFromPoint
SetWindowPos
DefFrameProcA
DialogBoxIndirectParamA
GetLastActivePopup
SetParent
HideCaret
ShowScrollBar
ChildWindowFromPoint
CreateIconFromResource
SetScrollPos
DrawAnimatedRects
SetUserObjectInformationW
RegisterClassA
GetKeyboardLayoutNameW
InternalGetWindowText
InsertMenuW
GetClassNameW
FindWindowA
DeferWindowPos
CopyImage
MapVirtualKeyW
GetDlgItem
CopyRect
GetCaretPos
SetSysColors
SetScrollRange
GetWindowRect
PostMessageA
SetDlgItemTextA
GetMenuItemCount
PtInRect
DrawFrameControl
GetMessageW
GetKeyNameTextW
LoadIconA
GetMenuState
SetActiveWindow
CharToOemA
InvertRect
CreateCaret
TrackPopupMenuEx
CreateAcceleratorTableW
MessageBoxExA
PostQuitMessage
SetCursor
SystemParametersInfoA
FindWindowExW
comdlg32
GetOpenFileNameW
ChooseFontW
CommDlgExtendedError
ReplaceTextW
FindTextW
gdi32
Ellipse
GetTextExtentPoint32A
CreatePen
GetViewportOrgEx
SetBrushOrgEx
CreateBrushIndirect
LPtoDP
PolyBezier
GetStockObject
StretchDIBits
GetTextAlign
DeleteDC
SetLayout
SetRectRgn
Polyline
SetMapMode
GetTextFaceW
PtInRegion
ExcludeClipRect
ScaleWindowExtEx
MoveToEx
SetPaletteEntries
SelectClipRgn
SetViewportExtEx
GetROP2
CreateFontIndirectA
RectVisible
CreatePatternBrush
OffsetViewportOrgEx
CreateHatchBrush
LineDDA
FlattenPath
GetTextCharsetInfo
AddFontResourceW
ExtFloodFill
GetObjectA
CreateFontA
GetRgnBox
kernel32
FoldStringW
GlobalSize
IsDBCSLeadByteEx
OpenSemaphoreW
MoveFileExW
HeapReAlloc
FindNextChangeNotification
HeapWalk
CreateEventW
GetSystemDefaultLangID
IsDBCSLeadByte
GetCommModemStatus
GetCurrentThreadId
CompareFileTime
WriteFile
CompareStringW
BuildCommDCBAndTimeoutsA
CancelWaitableTimer
SetMailslotInfo
GetCommTimeouts
CreateDirectoryA
GetTempPathA
SetErrorMode
GetBinaryTypeW
TransactNamedPipe
GetSystemDirectoryW
SetCurrentDirectoryW
lstrcpyA
ClearCommError
lstrcatW
HeapSize
SetThreadPriority
GetTimeFormatA
SetFileAttributesA
LoadLibraryExA
LoadLibraryW
GetCommProperties
WideCharToMultiByte
lstrcmpW
GetWindowsDirectoryW
Exports
Exports
?ResetEventHDJhjhFff@@YGKEPA_WG@Z
?ResetEventHDhjdDYUuYdf@@YGKEPA_WG@Z
Sections
.text Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dbg_ Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ