Q:\rrkuePDeazQrnn\ucpqpuv\stKumolttzn\Oqjrzywazf.pdb
Static task
static1
Behavioral task
behavioral1
Sample
721e6f5c0eb094e8054313735510cdbe_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
721e6f5c0eb094e8054313735510cdbe_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
721e6f5c0eb094e8054313735510cdbe_JaffaCakes118
-
Size
149KB
-
MD5
721e6f5c0eb094e8054313735510cdbe
-
SHA1
dbe1e7f3e9dbf3f72ba88ff4f3ff8cbd7e7e4021
-
SHA256
a83f9e0695e82c18e75bbdc8da55444a7216dfaf3e7cb88230df48c7197cf6be
-
SHA512
1fc53f0c2fb1fbf53c61d07da431e3fb52c24a76675c06c8dc7026648589397c26df22a34a8e1b16436d3d267385fee1826fe57afa4fbef5e484e0b4151e71da
-
SSDEEP
3072:BuK/mwi8cG2EkmSMmuIc+s0y8xMEjCfV1q6v0nVriYbbdds:BE8cPuB+s0BTjCt1B6VriSr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 721e6f5c0eb094e8054313735510cdbe_JaffaCakes118
Files
-
721e6f5c0eb094e8054313735510cdbe_JaffaCakes118.exe windows:5 windows x86 arch:x86
22b867f5c0496eb527ed7128b933cbc1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
PropertySheetW
CreateToolbarEx
ImageList_Remove
msvcrt
fgetc
strerror
_controlfp
fseek
__set_app_type
__p__fmode
iswctype
wcschr
getc
strcpy
__p__commode
_amsg_exit
strcspn
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
gmtime
tolower
__setusermatherr
putchar
__getmainargs
user32
AdjustWindowRect
EnumThreadWindows
GetClipCursor
OpenInputDesktop
SystemParametersInfoW
InflateRect
DrawIconEx
SetTimer
InSendMessage
ReplyMessage
SetWindowTextW
EnableMenuItem
TrackPopupMenuEx
GetWindowTextLengthW
GetKeyNameTextW
RegisterWindowMessageW
LoadBitmapW
GetScrollInfo
SendNotifyMessageW
DrawMenuBar
LoadStringA
IsRectEmpty
BeginPaint
InvalidateRect
GetDC
GetClassInfoExW
wsprintfA
MonitorFromRect
PostQuitMessage
GetWindowLongW
ReleaseDC
InternalGetWindowText
IsWindowEnabled
CreateDialogIndirectParamW
WaitForInputIdle
BringWindowToTop
DrawFocusRect
SendMessageTimeoutW
ValidateRect
CallWindowProcA
DefFrameProcA
SetWindowLongA
kernel32
lstrcpynA
GetTempFileNameW
GetACP
FreeResource
FindClose
UnhandledExceptionFilter
CreateRemoteThread
GetSystemDefaultUILanguage
GetSystemWindowsDirectoryA
UnmapViewOfFile
GetStdHandle
lstrcmpiA
EnumResourceLanguagesA
GetSystemWindowsDirectoryW
GetFileAttributesExA
GlobalDeleteAtom
LCMapStringW
FileTimeToLocalFileTime
TlsSetValue
SetEndOfFile
shlwapi
StrNCatA
gdi32
CreateICW
PtVisible
GetTextAlign
OffsetViewportOrgEx
ExtTextOutA
SetViewportOrgEx
GetCurrentObject
GetNearestColor
GetTextCharsetInfo
OffsetRgn
RoundRect
SetMapMode
GetSystemPaletteUse
GetFontData
SaveDC
CreateHalftonePalette
CombineRgn
ScaleWindowExtEx
Exports
Exports
?ModifyWindowEx@@YGPAIE*Z
?DecrementModuleA@@YGPAXPAGPAE*Z
?ValidatePointerW@@YGJF*Z
?DeleteScreenNew@@YGDDMPAEPAM*Z
?CancelExpressionNew@@YGKPAE*Z
?DeleteKeyNameEx@@YG_NF*Z
?RtlFilePathEx@@YGIPAJMPAI_N*Z
?CopySize@@YGDPANKMPA_N*Z
?DecrementFileExA@@YGIPAGIHE*Z
?ClosePenExW@@YGEEPAK*Z
?HideAppNameW@@YGENPAKM*Z
?FindFolder@@YGNPAIKDPAG*Z
?KillData@@YGIKG*Z
?CancelDirectoryExA@@YGPAM_NPAM*Z
?InstallValueNew@@YGED*Z
?FormatNameEx@@YGIEMIK*Z
Sections
.text Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 512B - Virtual size: 460B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idir Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edir Size: 1024B - Virtual size: 814B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vdir Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdir Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sdir Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ