O:\IealwgArb\AUkeang\bOehyzmZnj\ppIjpqyNtzx\vQglYdeuelw.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7350dd7fc2b48345dbeca290f43ed819_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7350dd7fc2b48345dbeca290f43ed819_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7350dd7fc2b48345dbeca290f43ed819_JaffaCakes118
-
Size
208KB
-
MD5
7350dd7fc2b48345dbeca290f43ed819
-
SHA1
1901c8e9b967e71987841d18a4405df8f013463a
-
SHA256
f07c312d59420839dc1af6e92508d3ade91c7e5663cd7818b58be079d5f25e88
-
SHA512
8daf6e71a6cf28ce5f59d0b17127dda046a879f8717f9ef89c5b05f441266d27043d7f794083727566953bbc6f79192979d9f3bb5ddef49560881e70d9e9d72d
-
SSDEEP
3072:f5WHO/6DP0lFDgB+GLjlBSfNbllrZbN3830drDBG0vDpMLfja2R0AIwm6sruGHb8:RUO/6QeBBHSfdzrZbN38gBX8RrZe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7350dd7fc2b48345dbeca290f43ed819_JaffaCakes118
Files
-
7350dd7fc2b48345dbeca290f43ed819_JaffaCakes118.exe windows:5 windows x86 arch:x86
8425d433613bff8ef084bfda0ec322e5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
SetViewportOrgEx
MoveToEx
TextOutW
SetLayout
CreateFontW
GetViewportOrgEx
CreatePenIndirect
GetROP2
GetObjectA
GetCurrentObject
CreateFontA
Ellipse
DPtoLP
GetTextMetricsA
CreateRectRgn
TextOutA
SetStretchBltMode
GetWindowOrgEx
LineTo
SetRectRgn
UnrealizeObject
ScaleViewportExtEx
GetTextExtentPointA
GetObjectW
RestoreDC
CreateDIBitmap
LineDDA
GetDIBits
ExtTextOutA
EnumFontFamiliesW
GetPaletteEntries
DeleteObject
SaveDC
SetBkMode
SetTextColor
FlattenPath
msvcrt
strerror
gmtime
swscanf
_controlfp
wcsrchr
strtol
srand
wcschr
fseek
__set_app_type
isspace
__p__fmode
__p__commode
strspn
_amsg_exit
fputc
_initterm
perror
vswprintf
bsearch
_acmdln
exit
_ismbblead
_XcptFilter
wcstod
atol
remove
isxdigit
_exit
_cexit
towupper
__setusermatherr
islower
ftell
__getmainargs
wcslen
calloc
free
wcscpy
user32
GetMenuCheckMarkDimensions
wsprintfA
TrackPopupMenu
GetClassLongA
PostThreadMessageW
IsRectEmpty
KillTimer
IsWindowUnicode
ScrollWindow
SetLastErrorEx
CharNextExA
CharUpperBuffW
GetMenuState
WaitForInputIdle
GetKeyboardLayoutNameW
InsertMenuA
CloseDesktop
GetWindow
GetWindowDC
GetIconInfo
SetCursor
GetUserObjectInformationA
DialogBoxIndirectParamA
GetSubMenu
BeginPaint
GetMessageTime
SendMessageW
DefWindowProcA
FrameRect
SendDlgItemMessageA
RegisterClassExW
IsZoomed
RegisterHotKey
MapWindowPoints
RegisterWindowMessageA
SetScrollInfo
RemoveMenu
DestroyCursor
GetDesktopWindow
SendMessageA
GetShellWindow
DialogBoxIndirectParamW
CheckMenuRadioItem
DrawFocusRect
GetDlgItemTextW
GetMenuContextHelpId
InvalidateRgn
SetScrollPos
SetWindowLongA
MapVirtualKeyA
PeekMessageA
DispatchMessageW
MessageBoxA
CreatePopupMenu
CharNextA
PostQuitMessage
SetWindowPlacement
DestroyCaret
GetMenuItemCount
CreateWindowExA
LoadBitmapA
GetNextDlgTabItem
GetAsyncKeyState
InsertMenuW
SendNotifyMessageW
SendInput
InsertMenuItemW
DrawTextA
GetSysColor
CreateDialogParamW
CharNextW
GetClassLongW
GetLastActivePopup
CreateWindowExW
SetWindowTextA
IsMenu
SetMenuDefaultItem
SwapMouseButton
DestroyMenu
MessageBoxExA
SetPropW
SetTimer
LoadCursorW
OpenDesktopW
DispatchMessageA
ValidateRect
SetWindowTextW
CheckRadioButton
comctl32
ImageList_LoadImageW
ImageList_SetIconSize
ImageList_AddMasked
CreatePropertySheetPageW
InitCommonControlsEx
kernel32
GetAtomNameW
SetCommTimeouts
GetSystemWindowsDirectoryW
CreateMutexW
SetEvent
FreeResource
GetExitCodeThread
LCMapStringA
CallNamedPipeW
BuildCommDCBW
TlsGetValue
GetSystemWindowsDirectoryA
SetSystemTime
CreateRemoteThread
CreateDirectoryA
GlobalFree
GetPriorityClass
GetDateFormatW
GetFileInformationByHandle
lstrcatW
CreateMutexA
FileTimeToDosDateTime
ReleaseSemaphore
GetLastError
GetFileAttributesA
MoveFileA
GetSystemDirectoryW
GetCommTimeouts
CreateFileMappingW
ResetEvent
WaitForSingleObject
GetFileSize
SleepEx
HeapWalk
SetUnhandledExceptionFilter
WinExec
LocalLock
lstrcpynW
GetProcAddress
GetStdHandle
OpenFileMappingW
SetFilePointer
Exports
Exports
?SetEventIDKJklDIUdiuo@@YGKEPA_WG@Z
?SetEventUDFIOuuiIFfd@@YGKEPA_WG@Z
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dbg_ Size: 72KB - Virtual size: 195KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ