Q:\zexnZnoXgrC\PrymzGo\gqqejtjbuG\cCfumgO\QaAqAbmhIx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7173d316b6be835332e6b4e1b178d382_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7173d316b6be835332e6b4e1b178d382_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7173d316b6be835332e6b4e1b178d382_JaffaCakes118
-
Size
196KB
-
MD5
7173d316b6be835332e6b4e1b178d382
-
SHA1
66177cfe9094f2cc0d0b9d15526dae2e4f878383
-
SHA256
0dc1519c20f85bceb42c5939f6772fde778aca70cf6cce9650c9e11f7beabdbc
-
SHA512
497099f6d92f06b7b70b071fd4c2c01a5920c5c25e0e2f36df5467d778bfb86b45d9a0e3e42de04d98e842b7009e5e6de81bcf8e32d706775489c9485a05258f
-
SSDEEP
3072:JdiFW450ujgl+IB1PIZr6qCAJkq13cV/dQ/nMa0u8TN2YQIWC:Ju50ujyB1QQqxJkq1+onMa0ue2mWC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7173d316b6be835332e6b4e1b178d382_JaffaCakes118
Files
-
7173d316b6be835332e6b4e1b178d382_JaffaCakes118.exe windows:5 windows x86 arch:x86
13862c6f42110c03b1860dd700fed2bc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
isprint
isxdigit
mktime
towupper
_controlfp
wcspbrk
strcpy
fclose
wcstol
wcscspn
ungetc
rand
strerror
setvbuf
__set_app_type
__p__fmode
__p__commode
fseek
fputc
isspace
calloc
setlocale
wcslen
perror
_amsg_exit
strpbrk
_initterm
isalnum
strtol
vswprintf
fputs
localtime
iswxdigit
wcstoul
fprintf
_ismbblead
_XcptFilter
puts
wcschr
sprintf
wcsncpy
_exit
_cexit
ftell
memset
__setusermatherr
fwrite
__getmainargs
comdlg32
GetSaveFileNameW
GetFileTitleW
PrintDlgExW
GetSaveFileNameA
CommDlgExtendedError
shlwapi
StrToIntA
comctl32
ImageList_GetIconSize
ImageList_Write
PropertySheetW
PropertySheetA
ImageList_AddMasked
CreatePropertySheetPageA
kernel32
SizeofResource
GetFileAttributesExA
GetTimeFormatA
PulseEvent
CreateRemoteThread
GlobalLock
SetCommBreak
lstrlenW
GlobalFlags
HeapCreate
GetLocaleInfoW
CreateNamedPipeA
FlushViewOfFile
CreatePipe
HeapAlloc
GetProcessHeap
lstrcpynW
WaitForSingleObjectEx
ResumeThread
SetEvent
RaiseException
LocalUnlock
GetModuleFileNameA
SetSystemTime
IsDBCSLeadByteEx
GetBinaryTypeA
CompareStringW
GetLastError
GetFileSize
lstrcatW
GetFullPathNameW
FindFirstFileA
WriteFile
GetComputerNameW
ClearCommBreak
CreateSemaphoreA
GetShortPathNameA
GetSystemDirectoryA
GetFileAttributesExW
CreateFileMappingW
CreateFileA
DisconnectNamedPipe
HeapFree
CallNamedPipeW
SetErrorMode
SetFileAttributesA
LoadLibraryExW
MoveFileExW
SetFileTime
SetUnhandledExceptionFilter
CompareStringA
UnmapViewOfFile
ResetEvent
LCMapStringW
IsValidLanguageGroup
user32
DestroyMenu
InvalidateRect
IsDialogMessageW
GetActiveWindow
ArrangeIconicWindows
GetClassInfoExA
GetKeyNameTextW
GetDoubleClickTime
MessageBoxA
MonitorFromPoint
SetRectEmpty
SendDlgItemMessageW
EnumWindows
GetScrollRange
ClientToScreen
GetForegroundWindow
CreatePopupMenu
GetSystemMenu
GetDlgCtrlID
TileWindows
GetCursorPos
SetWindowTextW
SetCursor
FrameRect
CheckRadioButton
IsWindow
DispatchMessageW
FindWindowExA
ShowScrollBar
CharNextExA
GrayStringW
CreateCaret
CreateWindowExA
SetRect
UnionRect
WaitForInputIdle
GetClassNameW
GetMenuItemID
MapWindowPoints
LoadAcceleratorsA
GetKeyboardLayoutList
GetKeyboardLayoutNameW
FindWindowW
LockWindowUpdate
CharPrevA
MonitorFromRect
RedrawWindow
GetLastActivePopup
GetMessageExtraInfo
EnumChildWindows
HiliteMenuItem
UpdateWindow
DestroyCaret
DefDlgProcA
IsCharAlphaW
PostMessageA
DrawMenuBar
TrackPopupMenuEx
InSendMessage
DeleteMenu
LoadImageA
CharUpperW
SwitchToThisWindow
PostMessageW
ModifyMenuW
GetMessageA
TranslateAcceleratorW
IsDialogMessageA
GetPropW
ScrollWindowEx
GetAltTabInfoA
PostThreadMessageA
SetTimer
SendMessageTimeoutW
GetMessagePos
EnableMenuItem
ChangeMenuW
ShowOwnedPopups
SendNotifyMessageW
DragObject
ClipCursor
MapVirtualKeyExW
SetForegroundWindow
BringWindowToTop
GetWindowPlacement
AdjustWindowRectEx
CreateIconFromResource
DefFrameProcW
DefWindowProcW
SetWindowPos
EnableScrollBar
OpenDesktopW
CheckDlgButton
SetWindowPlacement
DrawFrameControl
GetUpdateRect
GetDialogBaseUnits
LoadIconA
SetUserObjectInformationW
SetScrollInfo
RemoveMenu
SetMenu
IsDlgButtonChecked
CharToOemBuffA
CreateCursor
wvsprintfA
LoadAcceleratorsW
SetWindowLongA
AllowSetForegroundWindow
LoadIconW
InflateRect
DefDlgProcW
GetSysColor
SendDlgItemMessageA
CharUpperBuffA
GetShellWindow
GetMenuStringW
SendMessageW
Exports
Exports
?InsertRawPointDyXBc@@YGKHGE[D
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 205KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 162KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ