V:\ZfLQKvmua\fuGFNds\sbbgjzsubaB.pdb
Static task
static1
Behavioral task
behavioral1
Sample
660650430a429888edf08d63e4c0e21d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
660650430a429888edf08d63e4c0e21d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
660650430a429888edf08d63e4c0e21d_JaffaCakes118
-
Size
171KB
-
MD5
660650430a429888edf08d63e4c0e21d
-
SHA1
d5a091463f2f0a2baeb84a5b8caba9e4e9a3044c
-
SHA256
0fe00ccfa24e0f02ea0cd0753ccdd7d811a180bc80365ccdfbbb4d8938e01818
-
SHA512
f05b2f1e22fd0209755a12d9d1986ff12d0d6208ebceda1e64f8426ecead625ff1b35fc5c72862aa62af706a16e42e99529a5230cfca9c8811a88d7dca72fd04
-
SSDEEP
3072:P9Kdy0wmblLziVsbMunKIrTGofCGnCIJVRlENe7bE3nKRQeGCASvK4B5z9S8I:POyDmblLtbMuKAGmCGCIllzQebASy4PO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 660650430a429888edf08d63e4c0e21d_JaffaCakes118
Files
-
660650430a429888edf08d63e4c0e21d_JaffaCakes118.exe windows:5 windows x86 arch:x86
46f61ef129437a091e6ad6d3b92b5468
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
GetScrollInfo
InternalGetWindowText
CreateWindowExW
IsCharAlphaW
GetWindowTextLengthW
WindowFromPoint
LoadCursorA
GetMenuStringW
InSendMessageEx
GetSubMenu
GetClassNameW
DrawEdge
DialogBoxIndirectParamA
wvsprintfA
GetWindowRect
wsprintfW
MessageBoxExW
GetMessageTime
IsRectEmpty
CheckRadioButton
GetClientRect
GetUpdateRgn
ChangeMenuW
GetActiveWindow
IsIconic
KillTimer
DrawAnimatedRects
ScrollWindow
GetIconInfo
DefDlgProcA
IsDlgButtonChecked
ClipCursor
ToUnicodeEx
GetWindowPlacement
BeginPaint
GetNextDlgGroupItem
GetWindow
CallWindowProcW
GetUserObjectInformationA
GetClassInfoA
IsCharLowerA
MapDialogRect
CreatePopupMenu
CreateCursor
MoveWindow
CharPrevA
InvalidateRect
CharUpperA
SetScrollPos
GetClassLongW
GetMessageA
CloseDesktop
InsertMenuW
IsMenu
InSendMessage
CharToOemA
SetTimer
LoadImageW
InsertMenuA
RemovePropW
WaitMessage
DragObject
ClientToScreen
AdjustWindowRect
GetDC
HideCaret
CharPrevW
LoadBitmapW
GetWindowLongW
PostMessageA
SendNotifyMessageW
UnloadKeyboardLayout
GetKeyboardLayoutNameW
GetWindowTextW
DestroyWindow
GrayStringW
ScrollWindowEx
CopyRect
LoadBitmapA
CharUpperW
GetWindowTextA
SendInput
RegisterClassW
GetPropW
SetParent
ShowCursor
SetDlgItemInt
DestroyAcceleratorTable
PostMessageW
SendMessageTimeoutA
SendMessageTimeoutW
SetDlgItemTextW
DestroyMenu
CharLowerA
ShowScrollBar
GetSysColorBrush
GetForegroundWindow
ShowOwnedPopups
DefFrameProcW
RedrawWindow
SetFocus
EndDialog
RegisterClassExA
GetScrollPos
DispatchMessageA
DefWindowProcW
GetDoubleClickTime
SetCursor
DefFrameProcA
DeleteMenu
SetUserObjectInformationW
SendMessageW
DrawMenuBar
RegisterClassA
MapVirtualKeyExW
PostThreadMessageW
EnumWindows
DrawStateA
FindWindowA
GetSystemMetrics
msvcrt
clearerr
puts
strncpy
putc
wcsncpy
perror
putchar
wcscoll
swprintf
ftell
getenv
wcstombs
atol
wcslen
isdigit
_controlfp
strtok
__set_app_type
fseek
realloc
__p__fmode
wcscpy
__p__commode
strcpy
_amsg_exit
bsearch
strpbrk
tolower
_initterm
system
_ismbblead
strspn
wcscmp
isalnum
wcstod
vsprintf
iswctype
_XcptFilter
fgetc
_exit
iswprint
_cexit
wcsncmp
__setusermatherr
__getmainargs
strrchr
wcsrchr
comdlg32
GetFileTitleW
ChooseFontW
ReplaceTextW
FindTextW
kernel32
ClearCommBreak
HeapCreate
VirtualFree
GetLastError
MulDiv
GetCommTimeouts
QueryPerformanceCounter
FindFirstChangeNotificationW
GetSystemWindowsDirectoryW
CreateSemaphoreW
LocalUnlock
HeapReAlloc
GetSystemDirectoryA
GlobalGetAtomNameW
CopyFileA
CreateThread
TlsFree
LoadLibraryA
LocalAlloc
OpenFileMappingA
GetBinaryTypeW
GetUserDefaultLangID
lstrcpynW
WaitForMultipleObjects
SearchPathW
GetTempPathW
SetCommBreak
lstrlenA
SetNamedPipeHandleState
GlobalReAlloc
GetCurrentThread
GetNumberFormatA
EnumSystemLocalesA
IsBadReadPtr
IsBadCodePtr
SearchPathA
lstrcmpiW
OpenEventW
LocalFree
ConvertDefaultLocale
OpenFileMappingW
CreateNamedPipeA
DeleteFileA
GetTempPathA
GetExitCodeThread
GetFileAttributesA
GetOverlappedResult
GetFullPathNameA
lstrcatA
ClearCommError
PulseEvent
GetFileAttributesExA
GlobalGetAtomNameA
SetThreadAffinityMask
SetFilePointer
WaitForSingleObjectEx
shlwapi
StrToIntW
Exports
Exports
?GetShiftAltInfo@@YGK_KHE:O
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bit Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.insec Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.inmin Size: 512B - Virtual size: 86B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wall Size: 1024B - Virtual size: 258KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 138KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ