J:\QyixeqlkxArPu\vzEcoiBr\VuTFwtmwaom.pdb
Static task
static1
Behavioral task
behavioral1
Sample
830ed72d77256bf11107994813a845de_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
830ed72d77256bf11107994813a845de_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
830ed72d77256bf11107994813a845de_JaffaCakes118
-
Size
222KB
-
MD5
830ed72d77256bf11107994813a845de
-
SHA1
d170a104e09b8953ac7d395958bef4781653a70a
-
SHA256
3304462eb8a61fc0f816a2c7ffcf8cb874fef9ae292990d23018908677c1585b
-
SHA512
b778b2386c78d780bb08627259d3cedccc348a826b0e14b1c4255219b1e871811f0bce60fb6cff7396e9e5c07a825d035b1c20df4910e3898d6167ada550c129
-
SSDEEP
6144:6H5Jn8rLSxPXM1UCPoF2Oj42u3zecj1BJbh+:KcruPcAsOj45bJN+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 830ed72d77256bf11107994813a845de_JaffaCakes118
Files
-
830ed72d77256bf11107994813a845de_JaffaCakes118.exe windows:5 windows x86 arch:x86
2619026d11a6dfac71b431d27d0d97bb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
GetSaveFileNameW
PrintDlgExW
FindTextW
gdi32
CreateBitmapIndirect
BeginPath
GetROP2
ExtFloodFill
CreateBitmap
Rectangle
GetTextAlign
EnumFontFamiliesW
DeleteObject
CreateFontA
CreatePatternBrush
TextOutA
GetClipBox
SetDIBitsToDevice
GetTextCharsetInfo
GetRgnBox
CreateEllipticRgnIndirect
GetCharWidth32W
FillRgn
CreateFontIndirectW
Escape
TranslateCharsetInfo
CreateRectRgn
GetTextColor
GetTextExtentPointW
SetWindowExtEx
EndPath
StartDocW
GetObjectA
SetBrushOrgEx
EndDoc
PathToRegion
ScaleWindowExtEx
GetPaletteEntries
CreateICW
RectVisible
GetNearestColor
msvcrt
getc
fseek
malloc
srand
strtol
mbstowcs
strerror
_controlfp
__set_app_type
__p__fmode
__p__commode
rand
_amsg_exit
wcscmp
_initterm
wcspbrk
_acmdln
tolower
putc
exit
_ismbblead
strtok
setlocale
wcstoul
qsort
_XcptFilter
sscanf
strrchr
iswctype
bsearch
strpbrk
_exit
_cexit
getenv
__setusermatherr
wcstombs
time
__getmainargs
swscanf
wcstod
kernel32
SetFileTime
IsBadCodePtr
SearchPathW
GetTempFileNameW
SetFileAttributesW
LoadResource
FindFirstChangeNotificationW
CreateSemaphoreW
FileTimeToLocalFileTime
EnumResourceTypesA
lstrlenW
OpenFileMappingW
HeapAlloc
BuildCommDCBAndTimeoutsW
EnumResourceNamesW
GlobalCompact
CreateWaitableTimerW
GetFileAttributesW
CompareStringW
VerSetConditionMask
SetThreadExecutionState
SleepEx
GetFullPathNameA
HeapWalk
OpenFileMappingA
MoveFileExW
GetStdHandle
SetCurrentDirectoryW
SetSystemTimeAdjustment
SizeofResource
GetFileTime
SetWaitableTimer
MapViewOfFile
HeapUnlock
GetFileAttributesExA
PulseEvent
UnlockFile
CreateMutexA
GetFileAttributesA
CreateNamedPipeW
GetPriorityClass
user32
GetNextDlgTabItem
CharToOemA
PeekMessageA
IsCharAlphaNumericW
RegisterClassA
RegisterHotKey
InsertMenuItemW
DefFrameProcA
InSendMessage
SetWindowLongA
CreateWindowExA
DragObject
SetRect
CharNextExA
DefWindowProcA
GetWindowTextW
ClipCursor
TranslateAcceleratorA
ChildWindowFromPointEx
CharPrevW
CreateCaret
GetPropW
RegisterWindowMessageA
GetDialogBaseUnits
GetScrollRange
TileWindows
CharToOemW
SetPropW
CharLowerW
SwitchToThisWindow
SetWindowPos
ShowScrollBar
GetSubMenu
RemovePropW
SetMenu
LoadBitmapA
DestroyCaret
DestroyCursor
ScreenToClient
GetNextDlgGroupItem
GetMessageExtraInfo
ModifyMenuW
SetWindowTextW
VkKeyScanW
EndDialog
MonitorFromRect
SetCaretPos
PostMessageA
ChangeMenuW
SetCursor
PostMessageW
DrawStateA
IsCharAlphaW
KillTimer
OffsetRect
OpenDesktopW
SendMessageA
GetUpdateRgn
MoveWindow
LoadIconA
GetKeyboardLayoutList
DefDlgProcA
ExitWindowsEx
RemoveMenu
SwapMouseButton
IsChild
GetClassInfoA
CopyImage
LoadStringA
OemToCharA
CharLowerA
RegisterClassExW
ValidateRect
MessageBoxExW
FillRect
ArrangeIconicWindows
GetClientRect
GetAsyncKeyState
GetMenuState
ShowCursor
CreateIconIndirect
GetKeyState
GetMessagePos
InvertRect
GetClipCursor
FindWindowExA
BeginPaint
EnableScrollBar
DialogBoxParamA
SetForegroundWindow
Exports
Exports
?ReleaseSemaphoreQWiieiuIUDf@@YGKEPA_WG@Z
?ReleaseSemaphoreUDIOijlkdLI@@YGKEPA_WG@Z
?ReleaseSemaphoreUDSuJDJKDOIUD@@YGKEPA_WG@Z
?ReleaseSemaphoreUkudkKJDiu@@YGKEPA_WG@Z
Sections
.text Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ