N:\IIkbpjgu\ktbdfipyolyl\nGtYHcqPd\zTZuiqeFhikbdS.pdb
Static task
static1
Behavioral task
behavioral1
Sample
65c25060a0f36ea0be5a17236c90f4bb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
65c25060a0f36ea0be5a17236c90f4bb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
65c25060a0f36ea0be5a17236c90f4bb_JaffaCakes118
-
Size
138KB
-
MD5
65c25060a0f36ea0be5a17236c90f4bb
-
SHA1
c598c2557f35f06ad37239c18c4781ea2597b996
-
SHA256
29e7966012841e8083f74684bfe8ac469dcf76b1d237f47cdd542e643c2d4d96
-
SHA512
4497ff296f6379c1b4f84943bbf002ed627a95d04f9ef597d784fddc80dcb90dfa544931055a421c17dab94bb9f52cabd62c00e9fb9c6565c134efc387e08b67
-
SSDEEP
3072:TipVufIp4owaxmMwGT4m1X2sWPwij1TUQQzpUyF85lyFYgDPyiz:TOVYncn1hKyQXM85lGYgOiz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 65c25060a0f36ea0be5a17236c90f4bb_JaffaCakes118
Files
-
65c25060a0f36ea0be5a17236c90f4bb_JaffaCakes118.exe windows:5 windows x86 arch:x86
a714feda0a73bc2c19d840c4fc4fdb21
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
StrTrimA
kernel32
FindNextFileA
CreateNamedPipeA
GetComputerNameW
lstrcmpA
SetCommState
GetTickCount
WaitForSingleObjectEx
InitializeCriticalSection
FoldStringW
CopyFileA
GetSystemDirectoryW
SetThreadExecutionState
GetFileType
SetHandleCount
msvcrt
exit
user32
SwitchToThisWindow
GetDCEx
GetMenuItemInfoW
ToUnicodeEx
CharNextExA
SetTimer
GetLastActivePopup
LoadStringW
IsRectEmpty
GetDlgItemTextA
GetTopWindow
RedrawWindow
LockWindowUpdate
GetDlgItem
CopyAcceleratorTableW
GetMenuItemCount
LoadImageW
LoadAcceleratorsA
LoadImageA
SetWindowLongW
GetPropW
LoadAcceleratorsW
CharLowerA
CreateAcceleratorTableW
InvalidateRgn
OffsetRect
SetScrollInfo
RegisterClassW
CharUpperA
mouse_event
comdlg32
GetSaveFileNameW
PrintDlgW
CommDlgExtendedError
gdi32
CreateBitmapIndirect
RealizePalette
SetBitmapBits
SelectObject
UnrealizeObject
CreateCompatibleDC
GetDeviceCaps
SetBkMode
GetTextFaceW
ExtFloodFill
CreateHatchBrush
PtVisible
EnumFontsW
Exports
Exports
?ahzkkrR_Z@@UGPAGPANM@Z
Sections
.text Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.itext Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 237B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.$debug Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dbg Size: 512B - Virtual size: 78B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tmp1 Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tmp2 Size: 512B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tmp3 Size: 512B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tmp4 Size: 1024B - Virtual size: 612B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tsc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ