Z:\nioVbMAFfHdkIh\sYfmGkgGsfjjoV\WcyohzGUAMv\oskYvpfoWJzc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7015559a5a101611c467ed898993afa8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7015559a5a101611c467ed898993afa8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7015559a5a101611c467ed898993afa8_JaffaCakes118
-
Size
146KB
-
MD5
7015559a5a101611c467ed898993afa8
-
SHA1
8669b4a7ff86db7ec2f8e6c37196d3f3a7affc0b
-
SHA256
eee180718f77bc9ec93f807ddc5a6f286030fd72e50aa97b877c13df27a832db
-
SHA512
e3f748621e00ab9680e7beeb176615e4b44a2465a8cb4a4705edc974cb6fda453db4fee681aa6869a4a07c77887d0083c060c8aa15c60f13715d505358db545f
-
SSDEEP
3072:uiyTrvMZH2OV/4SJ5KMt/XPxa8/lrO+j+yrX:u5TgZWOT5Tt//lrJLrX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7015559a5a101611c467ed898993afa8_JaffaCakes118
Files
-
7015559a5a101611c467ed898993afa8_JaffaCakes118.exe windows:5 windows x86 arch:x86
0b2a565784c80628907eeab16ef8e6d6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_Create
DestroyPropertySheetPage
ImageList_AddMasked
CreateStatusWindowW
ImageList_Write
ImageList_ReplaceIcon
msvcrt
_controlfp
vswprintf
setvbuf
__set_app_type
isalpha
wcscspn
strtol
strrchr
wcstoul
__p__fmode
wcstombs
wcschr
wcstod
fseek
__p__commode
iswdigit
_amsg_exit
setlocale
wcsncmp
strcpy
towlower
wcsrchr
_initterm
strtoul
sscanf
fgetc
_ismbblead
fgets
calloc
putchar
toupper
_XcptFilter
fflush
iswctype
system
wcstol
_exit
time
_cexit
isupper
swprintf
swscanf
isalnum
floor
__setusermatherr
__getmainargs
strchr
user32
DrawTextA
SetWindowPlacement
RegisterClassExW
InternalGetWindowText
DefDlgProcW
MessageBoxA
GetKeyboardLayout
InvalidateRect
LoadMenuW
GetWindowTextA
GrayStringW
CharToOemW
IsDlgButtonChecked
GetScrollInfo
IntersectRect
PeekMessageA
TranslateAcceleratorA
CharToOemBuffA
IsCharAlphaW
GetMenuCheckMarkDimensions
SendMessageW
GetKeyboardType
IsCharAlphaNumericW
GetMenu
GetMenuItemID
InsertMenuW
ScrollWindowEx
SystemParametersInfoA
TrackPopupMenuEx
SetDlgItemTextA
GetIconInfo
IsWindowVisible
SetFocus
SendNotifyMessageW
LoadBitmapW
GetLastActivePopup
CharLowerBuffW
GetSysColorBrush
InsertMenuItemW
GetParent
MapWindowPoints
CharUpperBuffA
ClipCursor
AllowSetForegroundWindow
SetActiveWindow
GetAsyncKeyState
SetDlgItemInt
IsIconic
DestroyCaret
HideCaret
wsprintfW
GetForegroundWindow
SetWindowPos
OffsetRect
CharLowerW
CharLowerA
GetMessageA
CharPrevA
CharNextA
UnloadKeyboardLayout
MapVirtualKeyExW
wvsprintfW
GetUserObjectInformationW
ScrollWindow
LoadAcceleratorsW
ChildWindowFromPoint
GetMessageTime
wvsprintfA
CheckMenuRadioItem
AppendMenuW
GetDlgItemTextA
DefWindowProcW
LoadIconW
CreateCaret
RegisterHotKey
ShowWindow
GetScrollRange
DrawStateW
WaitForInputIdle
DrawFocusRect
CallWindowProcW
GetUpdateRect
GetAltTabInfoA
ChangeMenuW
ShowOwnedPopups
GetClipCursor
MapVirtualKeyA
wsprintfA
GetDC
CreateDialogParamA
DrawTextW
ChildWindowFromPointEx
GetFocus
SwitchToThisWindow
RegisterClassExA
DialogBoxIndirectParamA
SetDlgItemTextW
LoadStringW
DestroyAcceleratorTable
MonitorFromPoint
LockWindowUpdate
IsDialogMessageW
GetPropW
GetKeyState
RegisterWindowMessageW
MoveWindow
CallWindowProcA
InvalidateRgn
PostMessageW
VkKeyScanW
DestroyCursor
SendMessageA
DrawStateA
DefFrameProcA
SendInput
EqualRect
GetWindowTextLengthW
SetWindowTextW
MonitorFromRect
kernel32
GetCurrentDirectoryW
IsBadCodePtr
GetACP
LoadLibraryW
GetFileSize
HeapAlloc
GetComputerNameExA
SetThreadPriority
MoveFileW
ResumeThread
GetLocalTime
GetDateFormatA
CopyFileW
CreateFileA
GlobalGetAtomNameA
FindResourceExA
SetFileApisToOEM
FreeLibrary
WriteFile
GetLocaleInfoW
GetModuleFileNameW
OpenSemaphoreW
ClearCommError
FindClose
HeapCreate
GetStartupInfoA
GetThreadLocale
LCMapStringA
SetSystemTimeAdjustment
HeapSize
TerminateThread
IsBadStringPtrW
GetCommTimeouts
GetTimeFormatA
CreateSemaphoreA
WinExec
DefineDosDeviceW
MoveFileA
GetComputerNameExW
GetVersionExA
IsDBCSLeadByte
lstrcmpW
lstrcpyA
GetSystemDefaultUILanguage
OpenFile
CreateNamedPipeA
GetAtomNameA
SleepEx
GetAtomNameW
GetNumberFormatA
CreateSemaphoreW
lstrcmpA
CreateRemoteThread
OpenFileMappingA
HeapFree
GetProcessHeap
QueryPerformanceCounter
lstrcpynA
GetExitCodeThread
Exports
Exports
?TestAccountSecDUoiJDK@@YGKGE[D
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ