T:\zzzsvfokgKiYzb\hDacGcr\aupwahfQ\pxqrphvlNqLWhn\UqItijA.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7894b7abdc27f7cf014d92971b8c3ab5_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7894b7abdc27f7cf014d92971b8c3ab5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7894b7abdc27f7cf014d92971b8c3ab5_JaffaCakes118
-
Size
214KB
-
MD5
7894b7abdc27f7cf014d92971b8c3ab5
-
SHA1
407b03806835e65be909d05c34418cfd5af1dba0
-
SHA256
9bdc7226b82f974f2718da65112b74124409e8c40661c619753fd7414b5f3dee
-
SHA512
1e48894d25bfe8a318b6f1b818ccaada0adba33b11245182221e737a0e57906b6e200075fe9b0a4dd0fcb054b6d19415d78338bcf4205843ccf99c1245a9366c
-
SSDEEP
3072:H6OjvWb/1nI+28Rhb2OjLFird7gT7LTs/2A9Hm8K+j+4s/V+AtsegYjZC3M:agWruToQOjLAdY0/lH8Is/8AdR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7894b7abdc27f7cf014d92971b8c3ab5_JaffaCakes118
Files
-
7894b7abdc27f7cf014d92971b8c3ab5_JaffaCakes118.exe windows:5 windows x86 arch:x86
9aefba836f2db202fcb52d8c0973cab6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
IsWindowEnabled
GetDlgCtrlID
LoadImageA
EnableScrollBar
CreateIconIndirect
SetMenuDefaultItem
CreateDialogParamA
GetMenuItemRect
DrawStateA
CheckMenuItem
SetWindowPlacement
SendMessageTimeoutA
KillTimer
DestroyCaret
LoadImageW
CreateCaret
GetTopWindow
BeginDeferWindowPos
CharToOemBuffA
CharToOemW
UpdateWindow
InternalGetWindowText
ToUnicodeEx
IsCharAlphaNumericW
GetActiveWindow
GetDlgItemTextA
GetClassLongW
GetCursorPos
SetWindowTextA
DestroyMenu
CloseDesktop
SetUserObjectInformationW
ActivateKeyboardLayout
MapVirtualKeyA
GetForegroundWindow
IsCharUpperA
AdjustWindowRectEx
FindWindowW
kernel32
LoadResource
CreateDirectoryA
lstrcatW
GetUserDefaultLangID
RemoveDirectoryW
HeapReAlloc
DeleteFileW
GetSystemWindowsDirectoryA
UnmapViewOfFile
GetStartupInfoA
VirtualProtect
FlushFileBuffers
lstrlenA
SetEndOfFile
IsBadStringPtrA
GetBinaryTypeA
GetShortPathNameA
FoldStringW
comctl32
ImageList_GetImageCount
CreatePropertySheetPageW
ImageList_GetIconSize
gdi32
Rectangle
SetBitmapBits
SetViewportOrgEx
AbortDoc
GetRgnBox
GetROP2
EndPage
GetCharWidth32W
BeginPath
PatBlt
GetSystemPaletteUse
Polygon
GetTextMetricsW
SetBrushOrgEx
SetDIBitsToDevice
msvcrt
islower
getc
time
_controlfp
__set_app_type
__p__fmode
strrchr
__p__commode
strncpy
swscanf
srand
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
remove
_XcptFilter
isalpha
_exit
_cexit
__setusermatherr
__getmainargs
putc
Exports
Exports
?LeaveCriticalSectionGDhkyjkjhHFJlF@@YGKEPA_WG@Z
Sections
.text Size: 170KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.diag_x Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.diag_y Size: 512B - Virtual size: 86B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.div Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idat Size: 512B - Virtual size: 412B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.imul Size: 512B - Virtual size: 243B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.plus Size: 1024B - Virtual size: 751B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.minus Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ