c:\eexseteoe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
837ab1f534b8bb57a7a65066b33ac175_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
837ab1f534b8bb57a7a65066b33ac175_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
837ab1f534b8bb57a7a65066b33ac175_JaffaCakes118
-
Size
540KB
-
MD5
837ab1f534b8bb57a7a65066b33ac175
-
SHA1
2a6934a2f37bc609cd7b0af09630279748367eb8
-
SHA256
d4d5bab23c56635746f3dfc71cf19afba7461ea060283260c579b66931459d24
-
SHA512
1f10920205d71fe44f5c646d4344f387ebb1b6b8a6f0957350d577cf646c50401e0f0fb81182894831689c7c81ea4835045e8d1643546da1e63d2334260d70f2
-
SSDEEP
12288:plMQS5fWDNUlSwgsoBeG+evi8lbDQWGlvUWQn2nYI5n:LJSCwgsosoaiXcvUWY8n
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 837ab1f534b8bb57a7a65066b33ac175_JaffaCakes118
Files
-
837ab1f534b8bb57a7a65066b33ac175_JaffaCakes118.exe windows:4 windows x86 arch:x86
744745ceac0a010833f819f6d2680dac
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
SheChangeDirExW
SHGetFileInfo
SHGetSpecialFolderPathA
ExtractIconExA
SHGetPathFromIDListA
kernel32
VirtualFree
EnterCriticalSection
FlushFileBuffers
InterlockedExchange
QueryPerformanceCounter
HeapCreate
WritePrivateProfileStructW
GetModuleHandleA
InterlockedDecrement
DeleteCriticalSection
SetComputerNameW
GetProcAddress
GetCurrentProcessId
LCMapStringA
GetTimeZoneInformation
SetEnvironmentVariableA
GetCommandLineA
GetEnvironmentStringsW
TlsFree
GetPrivateProfileStructW
VirtualQuery
GetVersion
EnumSystemCodePagesW
OpenMutexA
GetSystemTimeAsFileTime
GetCurrentThread
GetLocaleInfoA
GetStringTypeW
FreeEnvironmentStringsA
InitializeCriticalSection
GetCurrentProcess
CreateMutexA
GetModuleFileNameW
SetConsoleTitleA
CloseHandle
TlsSetValue
HeapAlloc
HeapFree
GetTickCount
RtlUnwind
IsBadWritePtr
InterlockedIncrement
TlsAlloc
LCMapStringW
FreeEnvironmentStringsW
ReadConsoleInputA
GetPrivateProfileStringA
SetFilePointer
GetFileAttributesExW
GetFileType
ReadConsoleOutputCharacterW
FindFirstFileExA
CompareStringA
GetNumberFormatW
GetStartupInfoW
ReadFile
GetStdHandle
WriteFile
SetConsoleWindowInfo
GetFileSize
GetStringTypeA
WideCharToMultiByte
LeaveCriticalSection
SetHandleCount
TlsGetValue
UnhandledExceptionFilter
SetStdHandle
GetEnvironmentStrings
SetEndOfFile
ExitProcess
GetModuleFileNameA
GlobalHandle
EnumResourceNamesA
MultiByteToWideChar
TerminateProcess
HeapReAlloc
LoadLibraryA
GetTimeFormatW
GetLastError
OutputDebugStringW
GetCPInfo
GetStartupInfoA
GetCommandLineW
GetCurrentThreadId
HeapDestroy
GetLocalTime
SetLastError
CompareStringW
VirtualAlloc
GetSystemTime
comdlg32
GetFileTitleA
ChooseColorW
ChooseFontW
user32
CreateWindowExA
DrawFrameControl
InSendMessageEx
ShowWindow
MessageBoxW
FlashWindowEx
CallWindowProcA
DdeInitializeW
RegisterClassExA
DdeUnaccessData
SetScrollPos
DestroyWindow
GetNextDlgTabItem
SetDlgItemTextW
RegisterClassA
TileWindows
CharPrevA
LoadAcceleratorsA
PostThreadMessageW
ReuseDDElParam
DefWindowProcW
UnregisterClassW
comctl32
InitCommonControlsEx
ImageList_Read
DrawInsert
ImageList_Write
CreatePropertySheetPageW
ImageList_EndDrag
InitMUILanguage
ImageList_SetIconSize
ImageList_Replace
ImageList_GetDragImage
gdi32
WidenPath
CreateHatchBrush
GetPath
LPtoDP
CreateICA
SetWinMetaFileBits
CopyEnhMetaFileA
GetObjectA
GetTextMetricsW
GetICMProfileW
SetLayout
SetRectRgn
PolyPolyline
advapi32
RegOpenKeyW
RegOpenKeyExA
CryptSetProviderExA
CryptGenKey
CryptGetHashParam
DuplicateToken
RegEnumKeyA
AbortSystemShutdownA
Sections
.text Size: 147KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 251KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 107KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ