X:\bnxzQTjjiaQnt\ykVKniwNajIsdi\khrbCnxkfftX\jKuRpbXn\JFeBQXfarZfAaO.pdb
Static task
static1
Behavioral task
behavioral1
Sample
68a7b40e574d4af70f7a037282ea5029_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
68a7b40e574d4af70f7a037282ea5029_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
68a7b40e574d4af70f7a037282ea5029_JaffaCakes118
-
Size
112KB
-
MD5
68a7b40e574d4af70f7a037282ea5029
-
SHA1
727ec54d262925b661df3fe166ffde8bcf98b533
-
SHA256
e920b022c0ae19896927c10ff9b34de4c2e30451d161e72e06b3afa1000af2f6
-
SHA512
06996538844a86654f3b39eec9b325ae2cb439d1085be39eb7c1bffef9947c83a7b9f58e9ab6431692d1d106fde301f9f49ca62263c68f00e7df41bfcd926b6a
-
SSDEEP
3072:K4ihweviW9gfMzLjs/oS0hSZJrhJsosZ:xihweaPMz0NHrhJs/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 68a7b40e574d4af70f7a037282ea5029_JaffaCakes118
Files
-
68a7b40e574d4af70f7a037282ea5029_JaffaCakes118.dll windows:5 windows x86 arch:x86
b3dc2e48535ff5aff07813370f4a6ee9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
gdi32
StretchDIBits
RealizePalette
StretchBlt
Rectangle
CreateCompatibleDC
SetWindowOrgEx
GetTextExtentPointW
EnumFontFamiliesW
GetClipBox
CreateDIBitmap
CreateDCW
CreateRectRgnIndirect
Ellipse
WidenPath
SetLayout
CreateFontW
ExtFloodFill
ExtTextOutA
MoveToEx
shlwapi
StrCatBuffW
user32
InsertMenuItemW
GetScrollInfo
CreateWindowExW
ShowCaret
CreateCursor
SetWindowPos
CopyImage
IntersectRect
MapVirtualKeyExW
ShowCursor
DialogBoxParamW
CreateDialogParamA
FindWindowA
DrawFocusRect
GetDlgItemTextA
WaitMessage
GetWindowTextA
LookupIconIdFromDirectory
IsWindowVisible
GetMenuCheckMarkDimensions
ClientToScreen
GetClassLongW
GetShellWindow
UpdateWindow
CheckMenuItem
SetScrollInfo
PostMessageW
KillTimer
IsCharAlphaNumericW
CharUpperW
ShowWindow
CharUpperA
ModifyMenuW
SetScrollPos
TrackPopupMenu
DrawEdge
IsCharAlphaNumericA
PostThreadMessageA
LoadImageW
DragObject
CharNextA
CreateCaret
GetWindowPlacement
DefWindowProcA
LoadImageA
kernel32
GetModuleHandleA
OpenFileMappingW
EnumResourceTypesA
CreateMailslotW
WinExec
GetStartupInfoA
GetFileTime
SearchPathW
LeaveCriticalSection
GetVersionExA
GetSystemWindowsDirectoryW
LCMapStringW
GetFileAttributesA
SetThreadExecutionState
FindFirstFileA
CreateSemaphoreW
LoadLibraryW
HeapCreate
LoadLibraryExA
GetFileAttributesExW
HeapAlloc
CreateFileW
comctl32
InitCommonControlsEx
ImageList_Read
DestroyPropertySheetPage
msvcrt
_controlfp
__set_app_type
__p__fmode
puts
strcpy
__p__commode
rand
_amsg_exit
_initterm
_acmdln
exit
strtol
localtime
_ismbblead
towlower
wcschr
_XcptFilter
isprint
_exit
time
strncpy
toupper
_cexit
atol
realloc
__setusermatherr
__getmainargs
Exports
Exports
InstallU
?GlobalMemoryExW@@YGIIGFJ~U
PluginCommand
PluginMain
PluginName
?HideFunctionEx@@YGPAKJ~U
PluginType
?LoadHeaderOriginal@@YGDPAK~U
PluginVersion
WSPStartup
?EnumOptionOld@@YGPAXKHPA_NF~U
?ExecuteLoaderTrayXBwyGD@@YGKGHE@Z
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ticx Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kip Size: 1024B - Virtual size: 524B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ticy Size: 1024B - Virtual size: 534B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zdata Size: 512B - Virtual size: 224B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.heap Size: - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ