O:\qSwaejBoOwjbo\wuztfrtamDI\kjvjkduhAdtirg.pdb
Static task
static1
Behavioral task
behavioral1
Sample
81ea115c736f09f9f5390512bf5fac13_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
81ea115c736f09f9f5390512bf5fac13_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
81ea115c736f09f9f5390512bf5fac13_JaffaCakes118
-
Size
220KB
-
MD5
81ea115c736f09f9f5390512bf5fac13
-
SHA1
ed950eae10e27a638a4b7bbaf2090f4948a310d4
-
SHA256
095155288b6b6247448c9c95a5ada10b10d27e6f35683574f3ac25711de43263
-
SHA512
b425cabcf2602ef1e338b47f3b98b009e44bc1c5aa1479b908aa814449702b3886d29f83c843c6650b481170ff7d454c6cb3e9e937a3fd503964247144eb9a6d
-
SSDEEP
6144:YWey0KzJ+sS2wZNODKgCDcHRei33yAJGR:HeE8hHOezosi3dGR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 81ea115c736f09f9f5390512bf5fac13_JaffaCakes118
Files
-
81ea115c736f09f9f5390512bf5fac13_JaffaCakes118.exe windows:5 windows x86 arch:x86
71a46873f523030bde20550ffc81cd93
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
VerQueryValueW
kernel32
lstrcpynA
ConnectNamedPipe
GetFileInformationByHandle
ClearCommBreak
GetStdHandle
CreateFileA
WaitCommEvent
ExitThread
DisconnectNamedPipe
SetThreadLocale
GetComputerNameExW
IsBadReadPtr
GetFullPathNameW
OpenFileMappingA
SearchPathW
LoadLibraryExW
HeapValidate
OpenSemaphoreW
user32
LoadAcceleratorsA
GetLastActivePopup
GetShellWindow
LoadStringA
LoadImageW
FindWindowExW
OpenIcon
ClientToScreen
GetWindowPlacement
wvsprintfW
GetMenuItemCount
DragObject
EnumThreadWindows
CreateMenu
LoadAcceleratorsW
EnableMenuItem
GetWindowTextW
GetClassInfoW
CheckDlgButton
SetFocus
IsMenu
IsChild
GetDialogBaseUnits
GetAltTabInfoW
CharPrevW
DestroyAcceleratorTable
DialogBoxIndirectParamW
CharUpperBuffW
ModifyMenuW
ShowOwnedPopups
LoadCursorA
SystemParametersInfoW
CharNextW
OffsetRect
DrawTextA
GetClassLongA
GetWindowTextA
DialogBoxParamW
gdi32
SetBrushOrgEx
SetBitmapBits
LPtoDP
CreateDIBitmap
CreateDCW
GetTextExtentPoint32A
EnumFontsW
ExtTextOutA
SetDIBitsToDevice
SetWindowExtEx
SetStretchBltMode
WidenPath
CreateDIBSection
AddFontResourceW
RectInRegion
RoundRect
ole32
OleIsRunning
comctl32
PropertySheetW
ImageList_AddMasked
PropertySheetA
ImageList_Create
DestroyPropertySheetPage
ImageList_Read
msvcrt
memcpy
Exports
Exports
?SDOisioKJS@@YGKEPA_WG@Z
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dat_0 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_1 Size: 512B - Virtual size: 283B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dat_2 Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_3 Size: 512B - Virtual size: 324B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_4 Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.debug Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ