Y:\BOqjkbzkJV\ehNkQXh\HnhpuuEwch\fbAbjgX\eJdAvddsSb.pdb
Static task
static1
Behavioral task
behavioral1
Sample
77ff7a59f4880eb41d43d7853b9698d1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
77ff7a59f4880eb41d43d7853b9698d1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
77ff7a59f4880eb41d43d7853b9698d1_JaffaCakes118
-
Size
212KB
-
MD5
77ff7a59f4880eb41d43d7853b9698d1
-
SHA1
bcdab5421190664d365b67c956649f6a5084ddb3
-
SHA256
90c64ecd24153373451bcdaaeb222f00bc2de570a62a98840a2577ece9725146
-
SHA512
705b9070ad06f1d5daba0c1170fa06975a3f8d81bb7bf61a018a7d72e9587c2f91d854cc6002aa722be4cc0c59a4f05eae52a0112eb47092301776a2cada6cfd
-
SSDEEP
6144:aRuGhxWBgap2DfADT/ENwPN9KwhFV3yJrwkVV7qm:fC102DU/ENSN9rJGhf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 77ff7a59f4880eb41d43d7853b9698d1_JaffaCakes118
Files
-
77ff7a59f4880eb41d43d7853b9698d1_JaffaCakes118.exe windows:5 windows x86 arch:x86
b16eec9cb6a4f4fcdac7c3a0c0995cc5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
Rectangle
SetRectRgn
DeleteObject
CreateFontIndirectW
CreateDCW
SetTextAlign
CreateRectRgn
GetCharWidth32W
GetNearestPaletteIndex
CreateHatchBrush
AddFontResourceW
CreateRoundRectRgn
SetBkMode
RemoveFontResourceW
comctl32
ImageList_Remove
ImageList_GetIcon
ImageList_LoadImageW
msvcrt
strncmp
_controlfp
__set_app_type
sscanf
__p__fmode
__p__commode
fgets
_amsg_exit
mbtowc
ungetc
ftell
_initterm
_acmdln
exit
_ismbblead
iswalpha
_XcptFilter
wcstombs
strtok
_exit
_cexit
bsearch
__setusermatherr
__getmainargs
user32
GetCursorPos
ActivateKeyboardLayout
SetWindowLongW
keybd_event
GetMenuItemInfoW
GetClassInfoExW
AttachThreadInput
DeleteMenu
MessageBoxW
MapVirtualKeyW
ClientToScreen
TrackPopupMenu
AppendMenuW
WaitMessage
SetSysColors
IsWindowUnicode
DialogBoxParamW
InvalidateRgn
ScrollWindow
ChildWindowFromPointEx
GetWindowLongW
TrackPopupMenuEx
CharUpperW
LoadStringW
DrawTextExW
RegisterClassW
GetMessageExtraInfo
GetDlgItemTextA
IsCharUpperA
IsWindowEnabled
LoadAcceleratorsW
SendMessageW
DrawFrameControl
advapi32
LookupPrivilegeDisplayNameA
kernel32
IsDBCSLeadByteEx
FindClose
OpenEventA
TlsSetValue
HeapSize
InitializeCriticalSection
SetSystemTimeAdjustment
GetModuleHandleA
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
GetUserDefaultLangID
GetProcAddress
GetBinaryTypeW
FlushViewOfFile
lstrcatW
HeapValidate
ClearCommBreak
Exports
Exports
?TryEnterCriticalSectionJKDJHLJHKDljfjhl@@YGKEPA_WG@Z
Sections
.text Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.iadt Size: 512B - Virtual size: 392B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdit Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdgt Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.div Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.up Size: 1024B - Virtual size: 515B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.down Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ