L:\wEQu\Gcrxtjmj\sbdrUD\wNLb\nzngndl.pdb
Static task
static1
Behavioral task
behavioral1
Sample
736d062ba0f13f2a58ef0919f3248a9d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
736d062ba0f13f2a58ef0919f3248a9d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
736d062ba0f13f2a58ef0919f3248a9d_JaffaCakes118
-
Size
60KB
-
MD5
736d062ba0f13f2a58ef0919f3248a9d
-
SHA1
0494f9ac8d6f02ccaa2b5e89563cd0e2b0b9536c
-
SHA256
1b40c5257f83b786d5e0524b511cd9dc9cb7b2ba5f85124825f3a4ebe2e86dd7
-
SHA512
a883311a4fd75b9fa4c594d4bd9a45ce789bb361017e38a480913897aee62247c4cdad6fe6db164733c01b0d829440ec252db809c701c21b9a3987a96648df94
-
SSDEEP
768:vb/0AdsRjuZYx7cEZJz9oWXGHMnbXJupJTyhcRTsIMYAVxArzqVUtK+gNn/eY7CQ:LNdsIScEZLoubXJufTyh8AILw7UE+gx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 736d062ba0f13f2a58ef0919f3248a9d_JaffaCakes118
Files
-
736d062ba0f13f2a58ef0919f3248a9d_JaffaCakes118.exe windows:5 windows x86 arch:x86
f1ffc1985efa09c0f824a8e7a5fd581f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
SetDIBColorTable
TranslateCharsetInfo
CreateICW
OffsetRgn
ResizePalette
GetDIBColorTable
CreateRectRgnIndirect
SelectPalette
GetLayout
RemoveFontResourceW
CreateDiscardableBitmap
CreateEllipticRgnIndirect
SetBrushOrgEx
RealizePalette
user32
DispatchMessageW
CheckRadioButton
DestroyIcon
UpdateWindow
DefWindowProcW
IsZoomed
DefWindowProcA
GetSubMenu
SendMessageW
CharUpperBuffA
SetSysColors
SendMessageTimeoutW
TrackPopupMenu
InvertRect
DrawEdge
CascadeWindows
GetScrollRange
EnableScrollBar
SetCursor
GetMenuCheckMarkDimensions
IsDialogMessageA
GetClassInfoA
SetWindowTextA
PostThreadMessageW
ScrollWindow
IsDlgButtonChecked
GetWindowLongA
GetClassInfoExW
OpenDesktopW
InSendMessage
ntdll
memset
kernel32
HeapLock
TransactNamedPipe
SetEvent
ConvertDefaultLocale
WaitForDebugEvent
AreFileApisANSI
GetTempFileNameA
GetShortPathNameA
GlobalFindAtomW
FileTimeToSystemTime
lstrcmpiW
GetTempPathA
RemoveDirectoryA
SetHandleInformation
lstrcatA
DisconnectNamedPipe
ConnectNamedPipe
shlwapi
UrlUnescapeA
StrToIntW
UrlGetPartW
Exports
Exports
?y_am_o_ZETISP_MWE@@YGXPAG@Z
?LSXDrngafpq_i@@YGPAHPAJPAK@Z
?Uj_wgc_slL_O_@@YGPAK_N@Z
?XZbeKS_B_ne_xf_FM_@@YGPAHPAM@Z
?_YSYVFPS@@YGHPAK@Z
?_iclxEYCIgzUIFES__@@YGENH@Z
?EZL_OYABDYDQICFXKD@@YGHHJ@Z
?Y_LR__V_UO_PQYIpklYJG@@YGIK@Z
?f_F_BpG_Dt___hj_vlnqhb@@YGKD@Z
Sections
.text Size: 33KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ