M:\lduoyjfitktcda\obouIfhkgugDI\zllbZxvNjeNhYE.pdb
Static task
static1
Behavioral task
behavioral1
Sample
82cec23aa58ae4bd3e6eee78ae8522ca_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
82cec23aa58ae4bd3e6eee78ae8522ca_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
82cec23aa58ae4bd3e6eee78ae8522ca_JaffaCakes118
-
Size
212KB
-
MD5
82cec23aa58ae4bd3e6eee78ae8522ca
-
SHA1
19962d4635b7fc9a755cf084944624385d8d5d8b
-
SHA256
5751e251ed37fba5907f928458112fd8eb37363564adef42f62e476ade08b70c
-
SHA512
f26d5a63d4d54199ca0ebe88357d14c7c2aa4a2bc755f31d667df4509856b922479dcd30f9eb9a9f60e2ca2e82f0787dcbf3c1f7a1c5f9ffbcac6baa1618eed0
-
SSDEEP
6144:qMfybnRt6VgN/IY/mPQlP9Zy28B763Xxdw5RVLj:Dy76grUQljEByhdw5R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 82cec23aa58ae4bd3e6eee78ae8522ca_JaffaCakes118
Files
-
82cec23aa58ae4bd3e6eee78ae8522ca_JaffaCakes118.exe windows:5 windows x86 arch:x86
5bebdaaf8347c705dd13be336fbd0f0d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
towlower
system
wcslen
strstr
clock
_controlfp
strchr
__set_app_type
__p__fmode
ftell
iswctype
wcstok
__p__commode
_amsg_exit
_initterm
wcsrchr
putc
strspn
_acmdln
strcoll
wcstod
getenv
exit
floor
_ismbblead
sscanf
gmtime
_XcptFilter
bsearch
_exit
fclose
isprint
atoi
_cexit
strtok
free
__setusermatherr
fputs
__getmainargs
kernel32
GetHandleInformation
GetOverlappedResult
SetSystemTime
FileTimeToSystemTime
lstrcmpA
CreateSemaphoreW
HeapCreate
FindClose
WinExec
SetNamedPipeHandleState
CreateMutexA
SearchPathA
SetFileTime
FormatMessageW
GetFileInformationByHandle
SetEvent
GetComputerNameExW
WaitForSingleObjectEx
GetLocaleInfoW
FindResourceW
MoveFileExA
SearchPathW
FindFirstFileA
lstrcatA
SetCommState
GetAtomNameA
FindCloseChangeNotification
AreFileApisANSI
lstrcatW
BuildCommDCBW
lstrcmpiW
IsDBCSLeadByteEx
GlobalGetAtomNameA
IsBadCodePtr
GetACP
TransactNamedPipe
SetFileAttributesW
GetTickCount
CreateWaitableTimerA
MulDiv
TlsGetValue
comdlg32
ChooseColorW
PrintDlgExW
GetOpenFileNameA
ChooseFontW
GetSaveFileNameW
comctl32
ImageList_Destroy
ImageList_AddMasked
CreatePropertySheetPageW
ImageList_Read
ImageList_GetIcon
user32
DefDlgProcA
SendMessageA
UnionRect
CreateCursor
SetCursorPos
GetMenuItemInfoW
GetUserObjectInformationW
RegisterClassExW
InflateRect
SetCursor
IsDialogMessageA
CharNextA
ClientToScreen
GetClientRect
SetScrollInfo
OpenIcon
RegisterHotKey
DialogBoxIndirectParamA
EnumThreadWindows
VkKeyScanW
InsertMenuA
RegisterClassA
CharLowerA
SetDlgItemInt
KillTimer
GetDialogBaseUnits
TileWindows
GetWindow
LoadIconW
GetDoubleClickTime
GetSystemMetrics
IsDlgButtonChecked
CreatePopupMenu
DrawFocusRect
GetUpdateRgn
SystemParametersInfoA
GetParent
TranslateAcceleratorA
GetDCEx
MapWindowPoints
GetMessageW
MapVirtualKeyA
MapVirtualKeyW
ScrollWindowEx
SetMenu
ActivateKeyboardLayout
GetMessageExtraInfo
IsDialogMessageW
InternalGetWindowText
ShowWindow
GetWindowTextA
OemToCharA
FrameRect
CreateWindowExA
GetClassInfoExA
PostMessageW
PostQuitMessage
CharToOemA
CharToOemBuffA
GetMenuItemCount
FillRect
IsWindowUnicode
GetAsyncKeyState
GetClassInfoExW
DragObject
CreateIconIndirect
GetMenuStringW
ShowOwnedPopups
CharLowerBuffW
GetMenuCheckMarkDimensions
GetClassLongW
SetCaretPos
wvsprintfA
GetMenuContextHelpId
FindWindowA
GetTopWindow
GetWindowTextW
SetParent
IsCharUpperA
wsprintfW
ReplyMessage
GetDlgItemInt
SetTimer
GetMenu
DestroyCaret
SetWindowTextA
gdi32
PolyBezier
GetRgnBox
TranslateCharsetInfo
CreateICW
RectVisible
GetTextAlign
SetBkColor
BeginPath
CreateFontW
CreatePalette
SetTextAlign
CreateEllipticRgnIndirect
GetDIBits
SetBitmapDimensionEx
GetDeviceCaps
GetTextExtentExPointW
FlattenPath
ExtTextOutA
CreateFontIndirectW
MoveToEx
CreateRectRgnIndirect
Ellipse
PtInRegion
GetTextExtentPointA
Polygon
RectInRegion
EnumFontFamiliesExW
BitBlt
EndPath
GetROP2
CreateDIBSection
RoundRect
GetObjectW
PtVisible
ExtTextOutW
CreateCompatibleBitmap
Exports
Exports
?SetEventIDKJklDIUdiuo@@YGKEPA_WG@Z
?SetEventUDFIOuuiIFfd@@YGKEPA_WG@Z
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dbg_ Size: 72KB - Virtual size: 196KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ