D:\lznYVva\vvpFBpzbza\KJvtpceleCdR\wyofKopsaUij.pdb
Static task
static1
Behavioral task
behavioral1
Sample
682eb59dcf58adcb1979d3348236a5bc_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
682eb59dcf58adcb1979d3348236a5bc_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
682eb59dcf58adcb1979d3348236a5bc_JaffaCakes118
-
Size
217KB
-
MD5
682eb59dcf58adcb1979d3348236a5bc
-
SHA1
12f13192ae5f194544552e68c6322ec03a3ed304
-
SHA256
92f62c7f6c2bd619aecd1d1bc57028f1cd62673b16022a9116d560c9071d3b8e
-
SHA512
f35b3beacbd4aadd35cd7e3c767dea637dcea0e8e92abd2d11081d9439a55f8783221ba5dbe54f5856426031b15eef40993006830af50427fac02a0713e4f966
-
SSDEEP
6144:zVTjafTO767Oa/Kf/L7fLw9STu9U6XVG20va:zVTja7Om7Fifj3w9NfXVG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 682eb59dcf58adcb1979d3348236a5bc_JaffaCakes118
Files
-
682eb59dcf58adcb1979d3348236a5bc_JaffaCakes118.exe windows:5 windows x86 arch:x86
792ab510dd13f5276ec96050139f081c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
GetFileTitleW
FindTextW
CommDlgExtendedError
GetOpenFileNameW
user32
HiliteMenuItem
EnableWindow
GetDlgItem
BringWindowToTop
CharToOemA
MapVirtualKeyExW
MoveWindow
DefDlgProcW
CharLowerW
SystemParametersInfoW
SetWindowLongW
CharNextA
OffsetRect
GetSystemMenu
InternalGetWindowText
EndPaint
GetWindowPlacement
LoadAcceleratorsW
UnionRect
DrawFrameControl
GetWindowTextW
CopyAcceleratorTableW
GetClassInfoExW
DrawFocusRect
GetClassNameW
SendMessageTimeoutW
GetUpdateRect
SetWindowTextA
GetDCEx
GetKeyboardLayoutList
CreateIconIndirect
DrawIcon
WaitMessage
GetDialogBaseUnits
FindWindowExA
SetFocus
GetActiveWindow
MapVirtualKeyA
GetSubMenu
RegisterClassA
IsCharUpperA
wvsprintfW
SendDlgItemMessageA
SetSysColors
CharUpperA
GetAsyncKeyState
GetMenuItemID
SetWindowRgn
ValidateRect
KillTimer
GetClipCursor
MapDialogRect
TrackPopupMenuEx
CreateMenu
SetDlgItemTextW
DrawMenuBar
RegisterWindowMessageW
SetWindowPlacement
DefFrameProcW
GetSystemMetrics
GetDoubleClickTime
LoadCursorA
SetForegroundWindow
CreateWindowExW
ScrollWindow
EnumChildWindows
RedrawWindow
LoadMenuW
SetWindowPos
SetCursor
PostQuitMessage
SetPropW
SetLastErrorEx
SetTimer
GetDlgItemTextW
ChildWindowFromPoint
CharUpperBuffA
UnloadKeyboardLayout
WindowFromPoint
CharToOemW
DrawStateW
SetScrollRange
LoadCursorW
GetWindowRect
SystemParametersInfoA
ClipCursor
DrawTextA
GetWindowLongA
IsDlgButtonChecked
msvcrt
_controlfp
iswprint
__set_app_type
__p__fmode
sscanf
__p__commode
_amsg_exit
strcspn
isalnum
strchr
_initterm
rand
wcschr
_acmdln
wcsrchr
exit
strstr
wcstol
wcstod
wcstoul
tolower
strerror
_ismbblead
wcscpy
_XcptFilter
fflush
_exit
malloc
wcscspn
qsort
sprintf
printf
_cexit
swprintf
__setusermatherr
isspace
__getmainargs
clock
realloc
kernel32
lstrcmpW
HeapUnlock
CreateSemaphoreA
GetOEMCP
CompareStringW
FoldStringW
GetCurrentThread
GetVersion
GetCommandLineW
GetCurrentDirectoryW
FlushViewOfFile
GetACP
SetSystemTime
GetTickCount
LoadResource
LocalReAlloc
GetComputerNameExA
SetSystemTimeAdjustment
GetSystemWindowsDirectoryW
CompareStringA
ClearCommError
GetExitCodeThread
GetCommTimeouts
MoveFileExW
DeleteFileW
MulDiv
GetFileInformationByHandle
FindResourceA
DeleteAtom
EnumResourceNamesW
GetSystemWindowsDirectoryA
MapViewOfFile
GetThreadTimes
GetFileType
LoadLibraryA
GetVersionExA
WaitCommEvent
lstrcmpA
GetFileTime
WaitForMultipleObjects
BuildCommDCBAndTimeoutsW
gdi32
GetTextMetricsW
GetTextExtentPoint32W
ScaleWindowExtEx
ExtTextOutW
SetBkColor
SetDIBColorTable
RealizePalette
ScaleViewportExtEx
SetMapMode
Polygon
SetWindowExtEx
GetDIBColorTable
GetNearestPaletteIndex
CreateBrushIndirect
LPtoDP
StartDocW
RectVisible
SetROP2
EndDoc
GetBitmapBits
SetDIBitsToDevice
GetPaletteEntries
StretchDIBits
CreatePolygonRgn
StartPage
AddFontResourceW
CreateDiscardableBitmap
GetSystemPaletteEntries
GetTextColor
ExcludeClipRect
EnumFontFamiliesW
CreateDIBSection
GetObjectW
GetDeviceCaps
GetCharWidth32W
CreateDIBitmap
TranslateCharsetInfo
Exports
Exports
?AddSemaphoreExW@@YGPAFPAEPAIPAKPAM&U
?RtlFullNameW@@YGPAEPAEPAH&U
?HideStringEx@@YGEPA_NIPADPAK&U
?InsertPointA@@YGI_NPAHPAHH&U
?SendAppNameEx@@YGJMPAGD&U
?PutDialogOld@@YGEED&U
?GlobalObjectExA@@YGXK_NPADN&U
?GlobalStringExW@@YGPAGPAKG&U
?CrtTextW@@YGIK&U
?InsertDeviceExA@@YGPAXDGID&U
?SendWidthEx@@YGPAIPAKFDE&U
?CopyProjectNew@@YGKEPAGMG&U
?EnumWindowInfoA@@YGPAXJGPAIPAJ&U
?InstallObjectOld@@YGXPAJKG&U
?HideFilePathExA@@YGDGMJPAK&U
?RemoveSemaphoreExW@@YGHJ&U
?FormatPenW@@YGXN&U
?CancelProcessW@@YGPAHNEM&U
?RtlExpressionA@@YGIPAMM&U
?CallConfigW@@YGDFII&U
?RemovePathExA@@YGPAEPAID&U
?GetFunctionOld@@YGKG_N&U
?HideStringExW@@YGDIG&U
?FreeObjectOriginal@@YGEE&U
?HideCharExW@@YGPAXK&U
?IncrementClassExA@@YGXGPAFIE&U
?CrtSystem@@YGGD&U
?DecrementProject@@YGHNEPAE&U
?CallCommandLineOld@@YGFIPAEI&U
?FreeKeyNameExW@@YGKKM&U
?IsNotTimerOriginal@@YGNDNF&U
?EnumKeyNameOriginal@@YGMHGD&U
?ModifyCharNew@@YGG_N&U
?ProjectExW@@YGPAXPAI_NI&U
?ValidateDateTimeA@@YGDPANFK&U
?IsFullNameOriginal@@YGPAKPAMJPA_NPAD&U
Sections
.text Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imdat Size: 1024B - Virtual size: 860B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ