f:\tsakeso.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7781c381a46350ad967b87e8e1ab11f7_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7781c381a46350ad967b87e8e1ab11f7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7781c381a46350ad967b87e8e1ab11f7_JaffaCakes118
-
Size
720KB
-
MD5
7781c381a46350ad967b87e8e1ab11f7
-
SHA1
bed18f0213888f2ecbbe1ee9c23be25b5df6754f
-
SHA256
9eab4a4fb18a706a0178d9d1b1e97c4d6833fc36bf18db33a59b9146e4d38cc5
-
SHA512
89ce7f805ae35adc3980e6d9cab1e50d62712bab957ca296652f9dd17f452edbad27cf79064352f76a08cbaed68dd49aedbd01159ac275dff7f847423a80c572
-
SSDEEP
12288:yA9V7+NC5eQcqnQfif88xVlEa3I1t28lMHfy4FoYP:yyqvpCQfc88jlEy4nAa4Fo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7781c381a46350ad967b87e8e1ab11f7_JaffaCakes118
Files
-
7781c381a46350ad967b87e8e1ab11f7_JaffaCakes118.exe windows:4 windows x86 arch:x86
0ad67a0b9aeb70da1a49387c0b681a89
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
LoadIconA
FindWindowA
DeferWindowPos
CharLowerA
InvalidateRect
GetSubMenu
ModifyMenuA
SetCaretPos
SystemParametersInfoA
DrawIconEx
EnumChildWindows
ShowScrollBar
GetMenuItemID
OpenClipboard
CreatePopupMenu
OffsetRect
CheckMenuItem
GetScrollRange
SetCursorPos
WindowFromPoint
ScreenToClient
TranslateAcceleratorA
SendMessageA
DestroyCaret
SetWindowTextA
GetIconInfo
GetSysColorBrush
DrawFrameControl
InsertMenuA
AdjustWindowRectEx
MoveWindow
DrawTextA
DestroyIcon
ReleaseCapture
SetCapture
RedrawWindow
ClientToScreen
EnableMenuItem
GetKeyNameTextA
wsprintfA
CreateCaret
SetScrollInfo
CreateIconIndirect
UnregisterClassA
UpdateWindow
LockWindowUpdate
EnumWindows
PostMessageA
SetTimer
MapDialogRect
EnableWindow
IsWindowEnabled
GetMenuItemCount
SetRect
GetScrollPos
GetMessageTime
GetClassInfoExA
ValidateRect
MapWindowPoints
ScrollWindow
GetActiveWindow
BringWindowToTop
RegisterClassExA
SetRectEmpty
GetWindowPlacement
ReleaseDC
SetParent
GetLastActivePopup
GetCursorPos
GetAsyncKeyState
DrawIcon
RemovePropA
CreateDialogParamA
DrawEdge
KillTimer
PostQuitMessage
GetMenu
GetWindowRect
SetClipboardData
GetCapture
CreateMenu
EndDeferWindowPos
FillRect
SetCursor
SetWindowsHookExA
InsertMenuItemA
DispatchMessageA
CharLowerBuffA
GetNextDlgTabItem
GetWindowLongA
GetWindowThreadProcessId
GetDC
SetMenuDefaultItem
DefWindowProcA
GetMenuItemInfoA
ShowCaret
EmptyClipboard
LoadStringA
RegisterWindowMessageA
GetMenuStringA
GetFocus
LoadCursorA
GetSystemMenu
IsIconic
EndPaint
GetSysColor
GetParent
SetScrollPos
WinHelpA
CreateWindowExA
DrawTextExA
InflateRect
GetWindowTextA
GetWindowTextLengthA
CopyRect
AppendMenuA
SetScrollRange
ExitWindowsEx
GetMenuState
TabbedTextOutA
SetMenuItemBitmaps
LoadBitmapA
InvalidateRgn
BeginPaint
DestroyMenu
GetSystemMetrics
GetDlgItem
IsRectEmpty
GetPropA
ShowWindow
SetPropA
DestroyWindow
CharUpperA
GetWindowDC
MessageBoxA
GetClassInfoA
SetForegroundWindow
GrayStringA
TranslateMessage
GetClientRect
SetFocus
UnhookWindowsHookEx
GetScrollInfo
GetDesktopWindow
DeleteMenu
SetWindowLongA
SetWindowPos
GetClassNameA
GetTopWindow
EndDialog
GetMessageA
MapVirtualKeyA
PeekMessageA
IsDialogMessageA
GetDlgItemTextA
TrackPopupMenu
RegisterClassA
BeginDeferWindowPos
GetDlgCtrlID
SetDlgItemTextA
IntersectRect
DrawFocusRect
WaitForInputIdle
CheckDlgButton
LoadImageA
IsWindowVisible
UnionRect
IsWindow
GetMenuCheckMarkDimensions
GetWindow
CallNextHookEx
SendDlgItemMessageA
ShowOwnedPopups
DestroyCursor
LoadMenuA
gdi32
UnrealizeObject
GetWindowExtEx
Arc
DeleteObject
GetViewportOrgEx
MaskBlt
GetDCOrgEx
SetWindowExtEx
StretchDIBits
PolyPolyline
OffsetViewportOrgEx
GetViewportExtEx
SetBkMode
ExtCreatePen
GetWindowOrgEx
GetTextMetricsA
GetClipBox
GetNearestColor
SetWindowOrgEx
PolyBezierTo
SelectObject
GetBkMode
IntersectClipRect
StartPage
CreateFontIndirectA
GetRgnBox
MoveToEx
RestoreDC
EndPage
SetBrushOrgEx
CreateDCA
OffsetWindowOrgEx
GetStockObject
StrokeAndFillPath
SetPixel
CreatePen
EndDoc
GetTextColor
GetMapMode
CreateEllipticRgn
CreateBrushIndirect
LineTo
SetTextColor
ExtSelectClipRgn
SetAbortProc
CreateBitmap
SelectPalette
FillPath
SetBkColor
CreatePatternBrush
SetMapMode
StartDocA
PtInRegion
GetTextExtentPointA
CreateCompatibleBitmap
CombineRgn
Rectangle
PtVisible
RoundRect
GetClipRgn
BitBlt
CreateFontA
Ellipse
GetTextExtentPoint32A
GetObjectType
CreateCompatibleDC
DeleteDC
SelectClipRgn
StretchBlt
SelectClipPath
PatBlt
ExtTextOutA
GetGlyphOutlineA
GetPixel
GetDeviceCaps
OffsetClipRgn
CreateSolidBrush
StrokePath
CreateDIBSection
SetPixelV
TextOutA
EqualRgn
GetFontData
SaveDC
RectInRegion
kernel32
HeapDestroy
GetSystemTimeAsFileTime
GlobalAlloc
GetLocaleInfoA
TlsSetValue
WaitForSingleObject
GetCPInfo
HeapReAlloc
ExitProcess
SetUnhandledExceptionFilter
WriteFile
GetStartupInfoA
GetTimeZoneInformation
HeapCreate
GetSystemTime
FlushFileBuffers
HeapFree
GetFullPathNameA
GetModuleHandleA
InterlockedIncrement
GetExitCodeThread
TlsAlloc
HeapAlloc
WideCharToMultiByte
GetStringTypeExA
GetFileAttributesA
GetFileSize
GetEnvironmentStrings
GetCurrentProcessId
FindResourceA
MultiByteToWideChar
SetEnvironmentVariableA
TlsGetValue
GetPrivateProfileIntA
GetOEMCP
GlobalLock
WinExec
FreeResource
CompareStringA
InterlockedExchange
GetStringTypeW
RaiseException
DeleteCriticalSection
UnhandledExceptionFilter
GlobalReAlloc
Sleep
SetHandleCount
GetStringTypeA
TlsFree
GetACP
GetDiskFreeSpaceExA
GetCurrentThreadId
SetLastError
SuspendThread
MoveFileA
GetLastError
RtlUnwind
FileTimeToLocalFileTime
LCMapStringW
LockResource
SetFilePointer
CompareStringW
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
GetCurrentProcess
GetCurrentDirectoryA
ReadFile
GlobalHandle
LoadLibraryA
VirtualAlloc
GetTickCount
FormatMessageA
GetFileType
GetEnvironmentStringsW
GlobalUnlock
GetLocalTime
GetModuleFileNameA
TerminateProcess
InterlockedDecrement
LeaveCriticalSection
QueryPerformanceCounter
VirtualFree
GetTimeFormatA
GetVersion
SetStdHandle
CreateProcessA
FreeEnvironmentStringsA
CreateMutexA
CloseHandle
GetStdHandle
IsBadCodePtr
VirtualQuery
InitializeCriticalSection
EnterCriticalSection
LCMapStringA
comctl32
CreatePropertySheetPageA
ImageList_DragLeave
ImageList_Draw
ImageList_AddMasked
ImageList_ReplaceIcon
ord17
ImageList_DragShowNolock
ImageList_Destroy
ImageList_GetImageInfo
advapi32
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegCloseKey
RegDeleteKeyW
GetSecurityDescriptorDacl
RegOpenKeyExW
RegQueryValueExW
RegQueryInfoKeyW
RegSetValueExW
RegCreateKeyExW
Sections
.text Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 472KB - Virtual size: 471KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ