W:\aCUzluEXrimt\GLwvNaxo\ddNeIuk\xrcKOvbwruhK.pdb
Static task
static1
Behavioral task
behavioral1
Sample
67c49e52d4a8e44bffeefe6392d3a934_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
67c49e52d4a8e44bffeefe6392d3a934_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
67c49e52d4a8e44bffeefe6392d3a934_JaffaCakes118
-
Size
62KB
-
MD5
67c49e52d4a8e44bffeefe6392d3a934
-
SHA1
47d508c6c8eb3ade59074731892f0b4265c28d77
-
SHA256
c5717bf80d400222e18d09051e48e54514441a3f20f464f9e4ef647193798dd1
-
SHA512
56995399ba4ebafef20193b05a97a8bd5af5999bcf7f8be7f274a64ccdead6dba1ae8683ffe1d2168c7f9b398043f57b7c8cc6aa5236121d6e82b2e5ef774752
-
SSDEEP
768:8S+AP+7fiPUIMC09WIAbpAtUynq5FeIFJ7DVUZ3Zvz4eWVAL2v/mFSxPaiUe38LH:9+TGsIMgwIF1A3R5wACmFv7z/29/QBh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67c49e52d4a8e44bffeefe6392d3a934_JaffaCakes118
Files
-
67c49e52d4a8e44bffeefe6392d3a934_JaffaCakes118.exe windows:5 windows x86 arch:x86
3c15bdb3d7aac7e85d0e3bacea559374
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_Draw
CreateToolbarEx
ImageList_Remove
ImageList_GetIconSize
ImageList_GetIcon
DestroyPropertySheetPage
kernel32
GetFileSize
GetModuleFileNameA
GetUserDefaultLangID
SetNamedPipeHandleState
WaitForSingleObjectEx
RemoveDirectoryW
HeapCreate
GetLongPathNameW
GetComputerNameExA
GetSystemDirectoryA
lstrcpynW
CreatePipe
IsBadWritePtr
TlsFree
LockFile
lstrcmpA
GetFileAttributesA
GlobalLock
GlobalMemoryStatusEx
LoadLibraryA
CreateEventA
EscapeCommFunction
LockResource
ConnectNamedPipe
GetCommandLineW
CallNamedPipeW
TerminateThread
InitializeCriticalSection
GlobalFree
UnmapViewOfFile
GetSystemWindowsDirectoryA
FileTimeToLocalFileTime
GetCurrentDirectoryW
GetFullPathNameW
LoadLibraryExA
SetThreadContext
GetVersionExA
GetModuleHandleW
VerSetConditionMask
GetStartupInfoW
ClearCommError
FormatMessageW
HeapWalk
IsBadReadPtr
GetCommandLineA
DeleteCriticalSection
AddAtomW
VerifyVersionInfoW
lstrlenW
GlobalAddAtomW
QueryDosDeviceW
RaiseException
lstrcpynA
ReleaseMutex
FindResourceExW
user32
SetActiveWindow
GetMenuItemCount
SetScrollRange
GetCaretPos
InflateRect
SetForegroundWindow
GetMenuState
TrackPopupMenuEx
UpdateWindow
LoadStringA
DialogBoxParamA
GetActiveWindow
keybd_event
GetWindowTextLengthW
SetWindowLongA
FillRect
EnumWindows
ToUnicodeEx
GetDlgItemInt
IsDlgButtonChecked
DragObject
SendDlgItemMessageW
GetClipCursor
GetNextDlgTabItem
GetMessageW
wvsprintfA
IsRectEmpty
ModifyMenuW
HideCaret
IsDialogMessageA
DrawStateW
ClientToScreen
SetDlgItemTextA
LoadMenuW
GetClassNameW
PeekMessageA
ShowWindow
LoadMenuA
GetUserObjectInformationW
KillTimer
SetMenuItemInfoW
CharToOemBuffA
SetDlgItemTextW
GetWindowTextA
RegisterClassExA
CopyAcceleratorTableW
GetKeyboardLayoutList
IntersectRect
DrawTextA
InSendMessage
CreateMenu
PostMessageA
GetClassInfoA
ClipCursor
LoadImageW
SetRect
RegisterWindowMessageW
GetSubMenu
GetSysColor
CheckDlgButton
InvertRect
SetMenuDefaultItem
EnableScrollBar
LookupIconIdFromDirectory
GetDlgCtrlID
CharToOemW
SetFocus
ChildWindowFromPoint
EndPaint
LoadIconA
GetSysColorBrush
SendMessageTimeoutA
RegisterWindowMessageA
SetWindowPos
SetWindowTextW
GetKeyboardLayoutNameW
LoadIconW
AppendMenuA
GetClassInfoW
CreateWindowExW
ShowCaret
SendDlgItemMessageA
mouse_event
GetLastActivePopup
CharLowerW
SetClassLongW
RegisterHotKey
FindWindowA
wsprintfA
OemToCharA
GetShellWindow
HiliteMenuItem
LoadAcceleratorsW
ShowCursor
GetUserObjectInformationA
GetMenu
OpenDesktopW
GetMessagePos
CharNextW
MessageBoxExW
SendMessageW
CheckMenuRadioItem
DialogBoxIndirectParamW
MapVirtualKeyW
DestroyWindow
GetDlgItemTextA
CreateAcceleratorTableW
IsWindowEnabled
DrawIcon
AdjustWindowRect
DrawTextExW
SetLastErrorEx
MapDialogRect
ScrollWindowEx
SetWindowTextA
GetWindowPlacement
GetMenuStringW
EnumThreadWindows
msvcrt
atol
fread
_controlfp
atoi
wcsncmp
isdigit
sprintf
__set_app_type
strchr
__p__fmode
__p__commode
printf
_amsg_exit
iswalpha
islower
exit
setvbuf
strncpy
iswdigit
_initterm
fclose
_ismbblead
fgets
wcscpy
strpbrk
calloc
strcpy
sscanf
ungetc
wcscoll
wcschr
_XcptFilter
wcsstr
_exit
isalpha
_cexit
isspace
__setusermatherr
__getmainargs
gmtime
fwrite
malloc
fflush
toupper
strtok
isalnum
strstr
towupper
Exports
Exports
?GetShiftAltInfo@@YGK_KHE:O
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.init Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.erts Size: 512B - Virtual size: 86B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wall Size: 512B - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.info Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.udata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ