f:\sgdqppco.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7312b365d4e6ca93af679176093a2444_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7312b365d4e6ca93af679176093a2444_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7312b365d4e6ca93af679176093a2444_JaffaCakes118
-
Size
531KB
-
MD5
7312b365d4e6ca93af679176093a2444
-
SHA1
981bf36dec1174c9b9a2a7ca076d92018b3ec041
-
SHA256
ebdde4e894834c02574260debc03b9080be29c44313e61480fa7b9eacd3ec7e7
-
SHA512
833cd3dcf1b89829d7896f1722b0562ac97ea4332d3f0cb9999ac9b57d79720df1b70979cf3cb94f49e620fb41163ba6a14f94bf3b91d2c2041ad3e5a1967a76
-
SSDEEP
12288:omkpZRpMdCJY9pKyw810cxp0mCBp4RXO3RNZnoAw+:JkpZRpXJY9Ayn0cf0HvRIAw+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7312b365d4e6ca93af679176093a2444_JaffaCakes118
Files
-
7312b365d4e6ca93af679176093a2444_JaffaCakes118.exe windows:4 windows x86 arch:x86
c6a6f249d55ce68e1b50c6b66bc13552
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
user32
DdeQueryStringA
ChildWindowFromPoint
CreateDesktopW
RegisterClassExA
EqualRect
DdeInitializeW
TileWindows
LoadMenuIndirectW
GetClassLongA
CopyImage
GetTabbedTextExtentW
GetInputDesktop
GetSystemMenu
InSendMessageEx
DdeGetData
ScrollDC
RegisterClassA
AdjustWindowRect
GetLastActivePopup
CreateIconIndirect
OpenWindowStationW
kernel32
GetStdHandle
IsDebuggerPresent
DeleteCriticalSection
GetLocaleInfoW
GetConsoleMode
CompareStringA
SetEnvironmentVariableA
VirtualFree
MultiByteToWideChar
LoadLibraryA
SetFilePointer
HeapDestroy
HeapAlloc
WideCharToMultiByte
CreateMutexA
InterlockedIncrement
UnlockFile
lstrcmpi
RtlUnwind
FreeEnvironmentStringsA
VirtualAlloc
InterlockedDecrement
GetStringTypeA
GetVersionExA
IsBadReadPtr
HeapCreate
LockFileEx
WriteFile
GetCurrentThread
GetLocaleInfoA
EnumSystemLocalesA
GetModuleHandleA
GetModuleFileNameA
GetCurrentThreadId
HeapReAlloc
IsValidLocale
GetEnvironmentStringsW
InterlockedExchange
CompareStringW
VirtualQuery
GetLastError
CreateSemaphoreA
GetTimeFormatA
LCMapStringW
UnhandledExceptionFilter
GetFileType
TlsGetValue
SetStdHandle
lstrcpyn
OpenMutexA
TlsAlloc
GetTickCount
GetStartupInfoA
TerminateProcess
GetOEMCP
HeapSize
FlushFileBuffers
RemoveDirectoryA
LCMapStringA
HeapFree
GetCurrentProcessId
QueryPerformanceCounter
GetSystemTime
SetThreadContext
LeaveCriticalSection
SetComputerNameW
GetTimeZoneInformation
SetUnhandledExceptionFilter
LocalFree
SetConsoleCtrlHandler
GetCurrentProcess
FreeLibrary
Sleep
GetProcessHeap
GetProcAddress
GetConsoleOutputCP
FreeEnvironmentStringsW
GetCommandLineA
GetCPInfo
WriteConsoleA
GetConsoleCP
FindResourceW
EnterCriticalSection
CloseHandle
SetLastError
TlsFree
ReadFile
GetACP
IsValidCodePage
TlsSetValue
InitializeCriticalSection
ExitProcess
GetEnvironmentStrings
GetFullPathNameA
CreateFileA
GetSystemTimeAsFileTime
GetStringTypeW
GetUserDefaultLCID
WriteConsoleW
GetDateFormatA
SetHandleCount
Sections
.text Size: 369KB - Virtual size: 368KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ