W:\ucysxhjphzBR\foTzFcg\yqanHnzrPy\asjBIjzlQh.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7510e9d176293c4d7e192ba2dd5215ab_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7510e9d176293c4d7e192ba2dd5215ab_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7510e9d176293c4d7e192ba2dd5215ab_JaffaCakes118
-
Size
213KB
-
MD5
7510e9d176293c4d7e192ba2dd5215ab
-
SHA1
ae59e1cd77568d0e8b8353ae4d41141bcce794b1
-
SHA256
107b3c12ee124044d4976818099cd48aca111cbfb1c12325a623a85ebb0539f6
-
SHA512
b6b5ea62bca2b92afbcc379e3d7e162dc94aabbb19d54b441bf9a802709bb98c4bd77dd14ead9bcc9456b61f80682e0f5736f834d66b0f6866df634aadbdfbc0
-
SSDEEP
6144:gt5i50BiNHGZIdec1Ws1+Gh0czPkoKMKgltnE:gts5ukGaYmy83lNlxE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7510e9d176293c4d7e192ba2dd5215ab_JaffaCakes118
Files
-
7510e9d176293c4d7e192ba2dd5215ab_JaffaCakes118.exe windows:5 windows x86 arch:x86
a550d3ce6cdd32e44dc784b4e9c22149
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
realloc
_controlfp
iswprint
__set_app_type
strspn
__p__fmode
__p__commode
_amsg_exit
_initterm
fflush
_acmdln
exit
_ismbblead
getenv
iswxdigit
_XcptFilter
towlower
_exit
_cexit
__setusermatherr
__getmainargs
qsort
clock
kernel32
GetThreadContext
GlobalMemoryStatusEx
LockFile
GetModuleHandleW
GetSystemWindowsDirectoryA
GetExitCodeThread
IsValidLocale
WaitForMultipleObjectsEx
GetOEMCP
GlobalFree
lstrlenA
SizeofResource
lstrcpyW
SetCurrentDirectoryW
CreateNamedPipeA
FindResourceExW
GetBinaryTypeW
gdi32
GetTextCharsetInfo
CreateFontIndirectA
GetPaletteEntries
PolyBezier
WidenPath
CreatePolygonRgn
GetTextMetricsW
IntersectClipRect
RestoreDC
CreateRectRgn
PathToRegion
RemoveFontResourceW
GetNearestColor
SelectObject
RealizePalette
user32
CharPrevA
SetMenu
TrackPopupMenuEx
IsWindowVisible
CloseDesktop
CreateDialogParamW
ScrollWindow
GetParent
EnumWindows
SetScrollInfo
GrayStringW
DefFrameProcA
GetSystemMetrics
CharPrevW
RedrawWindow
GetClassInfoW
GetMenuItemID
CharUpperBuffA
MapDialogRect
IsCharAlphaNumericW
RegisterClassW
GetUserObjectInformationW
LoadCursorA
SetWindowTextW
DialogBoxParamA
RegisterClassExA
LoadAcceleratorsA
MapVirtualKeyA
GetKeyboardType
EqualRect
InSendMessageEx
ClientToScreen
PostThreadMessageW
PostMessageA
CharToOemBuffA
Exports
Exports
?DeleteSecurityDescriptorHdfjhjkfK@@YGKEPA_WG@Z
Sections
.text Size: 178KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idat Size: 512B - Virtual size: 376B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.diag_x Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.div Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.diag_y Size: 512B - Virtual size: 74B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.imul Size: 512B - Virtual size: 242B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.plus Size: 512B - Virtual size: 409B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.minus Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ