D:\SPNEESQD\PEOKEN.PDB
Static task
static1
Behavioral task
behavioral1
Sample
67d5146499261d9b2db603aac37abf83_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
67d5146499261d9b2db603aac37abf83_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
67d5146499261d9b2db603aac37abf83_JaffaCakes118
-
Size
716KB
-
MD5
67d5146499261d9b2db603aac37abf83
-
SHA1
2ab581b0fe584d45f9198e7acb71b2df9c792128
-
SHA256
b4af8df269f35e44921ad270ec3b901a8f4415f2ce415fa7c521b520f27c48ee
-
SHA512
9d4a20721cb0b2883363e30a8ea8c926fe13cf705006fb8a0aefd6fd82d96cf3b53391572a8aba36b107375884663bd2e9425a9a75ff0f0b7bdeb1d30686989e
-
SSDEEP
12288:zz+RNtvWQ6Tn5t60w/BIcHjtIfaNOXiz02w2Qd4aq+Y7HigDu2gYNmRokNM:zz+RNtvYu0OBlpeizR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67d5146499261d9b2db603aac37abf83_JaffaCakes118
Files
-
67d5146499261d9b2db603aac37abf83_JaffaCakes118.exe windows:4 windows x86 arch:x86
ec32ef2401bc68f909b316c767eb9047
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
SetWindowTextW
SetClassLongW
InvertRect
ToUnicode
EnumDisplaySettingsA
ShowWindow
DrawCaption
GetClipboardData
MessageBoxA
EnumDesktopsW
SystemParametersInfoA
DdeAbandonTransaction
DrawStateW
VkKeyScanExA
EnumWindowStationsW
DefWindowProcA
RegisterClassA
RegisterWindowMessageW
SetRectEmpty
ScrollWindow
DefMDIChildProcW
InSendMessage
RegisterClipboardFormatA
FindWindowA
DdeDisconnectList
DestroyWindow
GetWindowRgn
GetMonitorInfoA
BlockInput
SetWindowLongA
DdeClientTransaction
LoadImageW
CreateMDIWindowW
CallMsgFilterW
OemToCharBuffW
CreateWindowExW
RegisterClassExA
GetMessagePos
TrackPopupMenuEx
ShowOwnedPopups
WINNLSEnableIME
LoadImageA
CreateWindowStationW
CallMsgFilterA
SetDlgItemInt
PostThreadMessageW
CallWindowProcW
comctl32
CreateUpDownControl
ImageList_DragMove
DrawStatusText
DrawStatusTextA
ImageList_SetImageCount
ImageList_GetDragImage
ImageList_Add
CreateToolbarEx
DrawInsert
ImageList_Destroy
ImageList_SetOverlayImage
DestroyPropertySheetPage
InitCommonControlsEx
kernel32
TlsAlloc
GetTimeZoneInformation
GetEnvironmentStringsW
LeaveCriticalSection
DeleteCriticalSection
VirtualFree
GetDateFormatA
LocalHandle
GetLocaleInfoW
InitializeCriticalSection
CreateThread
GetFullPathNameW
SetHandleCount
ReadFile
HeapDestroy
RtlUnwind
GetACP
TlsFree
Sleep
WideCharToMultiByte
GetCurrentThreadId
UnhandledExceptionFilter
EnumSystemCodePagesA
TlsSetValue
CreateMutexA
WriteConsoleW
SetFilePointer
QueryPerformanceCounter
InterlockedIncrement
LocalUnlock
EnterCriticalSection
WriteConsoleA
GetCPInfo
TerminateProcess
GetTimeFormatA
GetConsoleMode
GetUserDefaultLCID
GetOEMCP
OpenEventW
LCMapStringA
CompareStringA
GetModuleFileNameA
CreateFileA
FreeEnvironmentStringsA
GetConsoleOutputCP
FreeEnvironmentStringsW
GetLastError
GetLocaleInfoA
GetCurrentProcessId
RtlMoveMemory
LoadLibraryExW
GetStringTypeA
SetUnhandledExceptionFilter
FreeLibrary
GetTickCount
GetConsoleCP
SetCurrentDirectoryA
CompareStringW
CloseHandle
SetThreadLocale
LoadLibraryA
HeapCreate
IsDebuggerPresent
VirtualAlloc
OpenWaitableTimerA
CreateMailslotA
HeapAlloc
SetLastError
SetEnvironmentVariableA
IsValidLocale
SetStdHandle
GetFileType
InterlockedDecrement
FileTimeToLocalFileTime
GetStringTypeExA
GetCurrentProcess
GetProcAddress
GetCurrentThread
HeapReAlloc
GetSystemTimeAsFileTime
GetStdHandle
LCMapStringW
GetStartupInfoA
HeapSize
InterlockedCompareExchange
ExitProcess
OpenMutexA
GetStringTypeW
IsValidCodePage
FlushFileBuffers
InterlockedExchange
GetProcessHeap
WriteFile
GetEnvironmentStrings
HeapFree
EnumSystemLocalesA
GetVersionExA
GetModuleHandleA
TlsGetValue
GetCommandLineA
VirtualQuery
MultiByteToWideChar
SetConsoleCtrlHandler
Sections
.text Size: 228KB - Virtual size: 225KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 264KB - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 112KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ