P:\esfbbLrpddhy\twvjssLvqfgbgz\vviiImtTbI.pdb
Static task
static1
Behavioral task
behavioral1
Sample
73ae26505c4167ced6108e4150548e60_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
73ae26505c4167ced6108e4150548e60_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
73ae26505c4167ced6108e4150548e60_JaffaCakes118
-
Size
85KB
-
MD5
73ae26505c4167ced6108e4150548e60
-
SHA1
7c0bd10c5bc2c5e360bab7e8d55149329550e893
-
SHA256
da2e649aa5cb238aa86b5e6c40d39fc66308aa0bce556fd262281a7cb770fac4
-
SHA512
399e21b9785c29d1839f19e6d00cef56b386d371155aac652e43c0ad09f6d658bb7d3a00fb6fa00de3b7bfaabd38ac36ba63b33686b353fae5c39ff3822c7ba8
-
SSDEEP
1536:ypYdqmAVoZ254dlcCN2b5V6jP78FnZ8831MeN4ZNvOtOMNW/F:yYdqmyoia5NEQ4dfN4DvOtOMNW/F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 73ae26505c4167ced6108e4150548e60_JaffaCakes118
Files
-
73ae26505c4167ced6108e4150548e60_JaffaCakes118.exe windows:5 windows x86 arch:x86
1d44bd29e72a8b1817d74673604aaefc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
ChooseColorW
GetOpenFileNameA
GetOpenFileNameW
PageSetupDlgW
msvcrt
exit
shlwapi
PathRelativePathToA
ChrCmpIA
gdi32
GetPaletteEntries
GetTextExtentPoint32W
Escape
ScaleWindowExtEx
GetSystemPaletteEntries
GetClipBox
ScaleViewportExtEx
GetNearestColor
CreateFontA
SetDIBColorTable
GetTextColor
CreateBitmapIndirect
ExcludeClipRect
kernel32
CreateWaitableTimerA
EnumResourceTypesA
GetPriorityClass
CreateDirectoryW
GetComputerNameA
GetCommProperties
lstrcmpiW
lstrcpyA
FindFirstFileA
GetFullPathNameW
GetFileSize
GlobalReAlloc
FindResourceA
lstrlenW
CallNamedPipeW
GetTempPathA
GlobalCompact
user32
GetNextDlgGroupItem
DefFrameProcW
DragObject
GetScrollRange
GetNextDlgTabItem
ShowScrollBar
GetMenuState
PostThreadMessageA
CascadeWindows
GetKeyboardType
LoadStringW
InsertMenuW
GetDlgItemTextA
LoadIconW
CreateDialogIndirectParamW
AppendMenuW
ChildWindowFromPointEx
CharLowerW
LoadCursorW
MapDialogRect
IsWindowEnabled
FindWindowA
CharPrevA
GetKeyNameTextW
WaitMessage
DefDlgProcW
DrawStateW
GetUpdateRect
ntdll
memset
Exports
Exports
?ktj_cv___yHLHOS@@YGPAMPAG@Z
?dfjn__ndwav_pqa_t@@YGPAXPAE@Z
?__o__ikh__hIME_EEU_ZYH@@YGMPAE@Z
?PTOqqVOjBHKxnnxcjlgq__@@YGIPAHPAI@Z
?_UCLB_KFIKVNOJX@@YGIN@Z
?pfd_Mn_hr_iG@@YGMD@Z
?TCCnla_l_u@@YGPAXPAMG@Z
?bZPJdcimlswn@@YGMPAKPAI@Z
?_Usc_w_hkSYSnqYR_GEMS@@YGIE@Z
?TM_P_TEix___bq_l_tes@@YGPAFDD@Z
?_mm_wL_Pshjphg@@YGNMPAN@Z
?LLPOapihVTWVPEHLUKKZ_Z@@YGPAEH@Z
?_bhsvydi@@YGPAGPAI@Z
?_AA_AJLNEKKI@@YGPA_NHPAI@Z
?MY_D_SERfe_cU___s@@YGPAKF@Z
?kcdggkyx@@YGPANFM@Z
?zvbihVYKtGLtss____j_@@YGPADM@Z
?mlp__otq_@@YGMKJ@Z
?zrk_cozQWR__DGJLK@@YGPAJIJ@Z
?VNOKQMTYKFZF_heb_@@YGPAFGG@Z
?zqniVZMJez_@@YG_NNE@Z
?JXS_KWQMphs@@YGPAKJ@Z
?EBDCKG_GreHBZOG_Y@@YGPAEPADPAH@Z
?OSZTUf_v@@YGFJ@Z
?ikkdkjomrnokqmzcjsuv@@YGHPAF@Z
?_y_zagela@@YGHI@Z
?jy__igxh_rsd@@YGGPAIPAM@Z
?_wLJ_AC____P_HF_@@YGIPAGI@Z
?gB_BPXPun_@@YGPAXPAKPAG@Z
?je_wO_XPbj@@YGEKPAJ@Z
?ryyegdudimpywd__pUQAlm@@YGPAMPAEM@Z
?fyk_qh_lbdhhiF_ZVL@@YGJK@Z
?_o___srrdftW@@YGPAXMPAI@Z
?_nH_VAJY_W_kl_n@@YGXPADF@Z
?lil__JIZZkuceXT@@YGEH@Z
?YPLLQ_qc__xkPLH_Z_V@@YGDE@Z
?_YRE_XM_QOQEZFZVU_OJ_O@@YGNPAF@Z
?H_DmG_FYX_yfACSL_G_Yo@@YGHPAH@Z
?mmt_OBELEKXL_AN@@YG_NI@Z
?DOJX_FHc_Z_@@YGPAK_NF@Z
?JW_RIFPTLZPctmLEOYt@@YGIFI@Z
?m_dtuglpqr_c__MV__Qysm@@YGHJPAK@Z
?nUWUXKNFovKAYegppg_A@@YGPAXPAD@Z
?kNT_TIQb_tziLB_ZRt_YU@@YGXPAJ@Z
?mpq_AFFSxipdzTOUjig@@YGE_NH@Z
?_fg_wmASfqg_f@@YGX_NG@Z
?M_GIAJ_W@@YGPAHG@Z
?__wciFMQ_R___WEZU_@@YGXKD@Z
?_xiiuowvtpvdTNLTTWX_@@YGPAKDPAK@Z
?KDbqftKN_OO@@YGHHJ@Z
?jg_uYJEQODIHbqkicNJQ@@YGPAGPAG@Z
?_SARFD_WF_J_La_Q@@YGPAHF@Z
?ZXKJMFK_RWKapcT_AAW@@YGXPAK@Z
?DSWEQrl_pj@@YGXD@Z
?shsk_uGN_L_BJWUSAy@@YGFM@Z
?salrc_ac_s_djakxnmz_@@YGPAEPAGH@Z
?___QIMP_LHisv@@YGMN@Z
?_M__YQJhD_@@YGKD@Z
?__ECN_OWek_iFD@@YGPAEPADPAI@Z
?W_MVyd__i@@YGXM@Z
?P___EBRSR@@YGEFN@Z
?BZVSKLU_MB@@YGJGF@Z
?djnxz_jreyxjxyxwtqfnq@@YGXPANPAI@Z
?fbsf_jInqdl__bQHT@@YGPAIPANF@Z
?G_J_TAzK__@@YGPAXPAM@Z
?Havt_q_zTGWH_Z__TU@@YGFPA_NN@Z
Sections
.text Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.export Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ldata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 507B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ