C:\dcHjxaykltxzw\NmdhycxV\jYvKulvfj\qbsbqHqiORb\swpFMhNuwxoaPT.pdb
Static task
static1
Behavioral task
behavioral1
Sample
67174f4d3db193f05ada21234e259984_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
67174f4d3db193f05ada21234e259984_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
67174f4d3db193f05ada21234e259984_JaffaCakes118
-
Size
39KB
-
MD5
67174f4d3db193f05ada21234e259984
-
SHA1
39482d5a8a2e4652c12123b465857c374c773675
-
SHA256
aeef4dd64ead202b5d335fb7baa2353bee2feb80b1b230996cafcfa1f2077b22
-
SHA512
5a01c9bd17ff4cf9bdf0299d3b9e19fb9de8392f1332da2235e035cd27a51a572f0c65a3b30fe05d455d65cac3e6e3eea71a7b93ad6d396c359232e8b6baf785
-
SSDEEP
768:jlcZrEZ+bZaaXREatNSoq5O+F7qYycR+TJ+q1Oog+EvsH5ego6YdFJ5U:SqKZaahbtUf5OuFyIq1oaegnYzJ5U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67174f4d3db193f05ada21234e259984_JaffaCakes118
Files
-
67174f4d3db193f05ada21234e259984_JaffaCakes118.exe windows:5 windows x86 arch:x86
fb594b04ef11e96832248465ce3da2d3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
wcsstr
_amsg_exit
memset
_initterm
_ismbblead
_XcptFilter
atoi
_wtoi
_exit
_cexit
puts
ftell
__setusermatherr
__getmainargs
gdi32
SelectPalette
EndPath
EndDoc
SelectObject
GetCurrentObject
SetTextColor
user32
GetClientRect
EnumThreadWindows
CopyRect
IsCharUpperW
wsprintfW
BeginDeferWindowPos
GetWindow
GetWindowDC
AppendMenuA
shlwapi
ChrCmpIW
UrlEscapeA
kernel32
CopyFileW
GetModuleHandleA
GetPriorityClass
GetModuleFileNameA
lstrcpyA
GetFileSize
GetOverlappedResult
lstrlenA
LoadLibraryA
Exports
Exports
?CreateDlgMessage@@YGHPAXPADK|U
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ort Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE