c:\enqeeoq\eawfbeep\wwo\aopehyhn.pdb
Static task
static1
Behavioral task
behavioral1
Sample
67d42f4ddddbd5a8ebc604e8087a1592_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
67d42f4ddddbd5a8ebc604e8087a1592_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
67d42f4ddddbd5a8ebc604e8087a1592_JaffaCakes118
-
Size
724KB
-
MD5
67d42f4ddddbd5a8ebc604e8087a1592
-
SHA1
6bd9aa224c4b596c3cfb584f560af65eeda663b3
-
SHA256
308f27f27bfb53eed53f80d5b2746c1265709845218ccb6ee524af9ec88b8b6a
-
SHA512
00078e2cb879e27382936c9b3a2590156efedbbfc2f704130b1e5d556decf34aa69af4a779b021aa2e13c2b88a4db2b8a776d3bf232d3d5d20847466a3f6737f
-
SSDEEP
12288:3zE6L7YLwnCu8CjE/hgnHCQaatY/BkbCeyFW8ADQ7g7tjFy:Dj79nNo/cHLauMBpbW8Iig7tjM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67d42f4ddddbd5a8ebc604e8087a1592_JaffaCakes118
Files
-
67d42f4ddddbd5a8ebc604e8087a1592_JaffaCakes118.exe windows:4 windows x86 arch:x86
e75f79c1cbb41d8fbb2ccae8c602bdf5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_Destroy
_TrackMouseEvent
ImageList_AddMasked
InitCommonControlsEx
advapi32
RegEnumKeyExA
AdjustTokenPrivileges
OpenProcessToken
RegCreateKeyExA
RegCloseKey
gdi32
Pie
MoveToEx
GetROP2
BitBlt
GetViewportExtEx
GetRegionData
SetROP2
SetAbortProc
ExtFloodFill
GetWindowExtEx
GetTextColor
PolyBezier
GetArcDirection
GetBitmapBits
CreateBitmapIndirect
CreateRoundRectRgn
GetOutlineTextMetricsA
PtInRegion
GetCharWidthA
ExtCreatePen
StretchBlt
ExtSelectClipRgn
GetNearestColor
PtVisible
PatBlt
SetBkColor
CreateEllipticRgnIndirect
GetMapMode
SetPaletteEntries
StrokePath
GetObjectA
CreateBitmap
GetObjectType
CreateRectRgnIndirect
GetTextMetricsA
DeleteObject
LPtoDP
ole32
CreateILockBytesOnHGlobal
CoInitialize
OleLoad
RegisterDragDrop
CLSIDFromProgID
OleGetClipboard
OleCreateStaticFromData
CoRegisterMessageFilter
RevokeDragDrop
StringFromGUID2
OleLockRunning
CLSIDFromString
CreateStreamOnHGlobal
OleIsCurrentClipboard
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
OleDuplicateData
ReleaseStgMedium
CreateItemMoniker
OleUninitialize
CoTaskMemFree
CoLockObjectExternal
DoDragDrop
OleInitialize
CoDisconnectObject
kernel32
IsBadCodePtr
ReadFile
FreeEnvironmentStringsA
GetStartupInfoA
GetTickCount
HeapDestroy
RtlUnwind
InterlockedExchange
GetCommandLineA
GetModuleHandleW
WriteFile
LCMapStringW
FlushFileBuffers
TlsAlloc
GetVersion
GetTimeZoneInformation
CloseHandle
SetStdHandle
LCMapStringA
InterlockedDecrement
CreateMutexW
GetSystemTimeAsFileTime
CompareStringW
VirtualQuery
GetStringTypeA
GetCurrentThreadId
SetUnhandledExceptionFilter
WideCharToMultiByte
GetFileType
GetLocalTime
LoadLibraryA
InitializeCriticalSection
HeapAlloc
LoadLibraryW
GetSystemTime
GetProcAddress
SetLastError
DeleteCriticalSection
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStartupInfoW
SetFilePointer
GetLastError
InterlockedIncrement
EnterCriticalSection
SetEnvironmentVariableA
VirtualAlloc
LeaveCriticalSection
GetModuleFileNameW
MultiByteToWideChar
GetModuleHandleA
HeapReAlloc
GetStdHandle
ExitProcess
HeapFree
GetCPInfo
TlsSetValue
UnhandledExceptionFilter
HeapCreate
FreeEnvironmentStringsW
VirtualFree
RaiseException
GetModuleFileNameA
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStrings
TlsGetValue
CompareStringA
GetEnvironmentStringsW
GetStringTypeW
GetCommandLineW
shell32
SHChangeNotify
SHAppBarMessage
ShellExecuteA
SHGetPathFromIDListA
SHFileOperationA
SHGetSpecialFolderLocation
ord155
SHGetMalloc
DragQueryFileA
user32
GetDlgItem
wsprintfW
MessageBoxW
GetSysColor
EndPaint
SendMessageW
GetMenuItemCount
BeginPaint
IsChild
SetCapture
GetMenuItemID
CreateWindowExW
DialogBoxParamW
GetMenu
RegisterClipboardFormatW
WindowFromPoint
IsIconic
GetWindowThreadProcessId
GetWindowLongW
ModifyMenuW
SetRect
CallNextHookEx
IsWindowEnabled
MessageBeep
SetCursor
RegisterClassW
GetKeyState
UnregisterClassW
LoadStringW
CreateDialogIndirectParamW
TrackPopupMenuEx
DeferWindowPos
DrawTextW
PeekMessageW
ChildWindowFromPoint
RemoveMenu
GetFocus
SetActiveWindow
GetWindowPlacement
GetSystemMetrics
DefWindowProcW
RegisterClassExW
SystemParametersInfoW
DestroyWindow
GetNextDlgTabItem
DrawFocusRect
GetLastActivePopup
SendMessageTimeoutW
GetCursorPos
GetMessageW
EnumWindows
SystemParametersInfoA
EnableWindow
SetClipboardData
LoadIconW
GetParent
SetWindowPlacement
GetCapture
MoveWindow
InsertMenuItemW
ReleaseDC
TranslateAcceleratorW
IsWindowVisible
CopyRect
DestroyIcon
GetSystemMenu
ScreenToClient
FillRect
SetFocus
GetClientRect
DeleteMenu
GetWindowDC
LoadCursorW
KillTimer
GetMessagePos
ClientToScreen
SetScrollInfo
SetWindowTextW
RedrawWindow
UnregisterClassA
LockWindowUpdate
SendDlgItemMessageW
OffsetRect
EnableMenuItem
PostMessageW
GetMenuItemInfoW
SetParent
CheckMenuItem
TrackPopupMenu
SetWindowPos
SetScrollPos
GetWindowTextW
DrawFrameControl
IsWindow
GetClipboardData
GetDlgCtrlID
PostQuitMessage
ReleaseCapture
LoadBitmapW
GetSubMenu
IsZoomed
SetForegroundWindow
TranslateMessage
GetMenuState
DrawEdge
UpdateWindow
GetDC
EndDialog
OpenClipboard
UnhookWindowsHookEx
SetWindowsHookExW
DrawIconEx
ShowWindow
GetClassInfoExW
CreateDialogParamW
InvalidateRect
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 464KB - Virtual size: 463KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ