f:\oje\kkodoedb.pdb
Static task
static1
Behavioral task
behavioral1
Sample
84d549b51244bfe54714765a8b885935_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
84d549b51244bfe54714765a8b885935_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
84d549b51244bfe54714765a8b885935_JaffaCakes118
-
Size
580KB
-
MD5
84d549b51244bfe54714765a8b885935
-
SHA1
b7bed078e9fbd7e7e32696c48460e8a1ab35d893
-
SHA256
fd48054571798a1a0a2dd4b172e9471d0fa7c93c7fd047c80767c98fde638e5c
-
SHA512
faebb1adc0e23501a2612676d7863ba213d7f5583b17dff788504af7de200337d722d8d501d4b59025ed634666ba610a7c9e590e4b6edb23638d27e703e7cc03
-
SSDEEP
12288:Vy0A2rneC4uF0cUCuvhY05IZKEBtewp8D6p5M0:VvACd4uFqvhY056BtXpH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 84d549b51244bfe54714765a8b885935_JaffaCakes118
Files
-
84d549b51244bfe54714765a8b885935_JaffaCakes118.exe windows:4 windows x86 arch:x86
25039a4ef669f311e758adbd16ce8f75
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
DdeUnaccessData
LoadIconW
MessageBoxA
DefWindowProcW
GetMenuDefaultItem
RegisterClassExA
EnableMenuItem
OpenWindowStationA
GetClipCursor
DestroyWindow
wvsprintfW
EnumPropsW
CreateCursor
GetDlgCtrlID
VkKeyScanW
SetLastErrorEx
RegisterClassA
SubtractRect
GetCaretPos
ShowWindow
ChangeDisplaySettingsExW
CreateWindowExA
ValidateRgn
SetWinEventHook
LoadCursorW
LoadKeyboardLayoutA
GetTopWindow
GetSysColor
kernel32
GetModuleHandleA
TlsGetValue
GetModuleFileNameA
UnhandledExceptionFilter
HeapFree
CloseHandle
GetStringTypeA
GetDateFormatA
LoadLibraryA
FreeEnvironmentStringsW
GetTimeFormatA
GetLocaleInfoA
GetSystemTimeAsFileTime
GetLastError
GetUserDefaultLCID
FileTimeToLocalFileTime
EnterCriticalSection
TlsFree
GetThreadPriority
TerminateProcess
GetLocaleInfoW
IsBadWritePtr
RtlUnwind
ExitProcess
GetCommandLineA
QueryPerformanceCounter
IsValidCodePage
SetConsoleCtrlHandler
SetHandleCount
IsValidLocale
HeapReAlloc
FreeEnvironmentStringsA
HeapCreate
TlsSetValue
GetOEMCP
VirtualProtect
CompareStringW
GetCurrentProcess
CreateMutexA
HeapSize
VirtualAlloc
SetStdHandle
SetConsoleOutputCP
InitializeCriticalSection
GetEnvironmentStringsW
SetEnvironmentVariableA
WriteConsoleOutputA
GetTimeZoneInformation
LCMapStringA
GetProfileIntA
GetCommandLineW
TlsAlloc
GetTickCount
ReadFile
LeaveCriticalSection
OpenMutexA
VirtualQuery
VirtualFree
DeleteCriticalSection
MultiByteToWideChar
GetStringTypeW
GetCurrentThread
WriteFile
GetCurrentThreadId
SetConsoleScreenBufferSize
GetStartupInfoW
SetFilePointer
GetACP
GetFileType
GetCurrentProcessId
CompareStringA
GetSystemInfo
SetThreadAffinityMask
EnumSystemLocalesA
FlushFileBuffers
SetLastError
GetEnvironmentStrings
GetProcAddress
GetStartupInfoA
GetModuleFileNameW
LCMapStringW
HeapDestroy
HeapAlloc
WideCharToMultiByte
GetVersionExA
GetStdHandle
GetWindowsDirectoryW
GetCPInfo
InterlockedExchange
comctl32
ImageList_GetIconSize
CreatePropertySheetPageW
InitMUILanguage
ImageList_GetFlags
ImageList_DragEnter
ImageList_LoadImage
ImageList_Write
ImageList_Draw
CreatePropertySheetPage
ImageList_GetBkColor
ImageList_DragLeave
ImageList_Read
ImageList_AddIcon
ImageList_AddMasked
ImageList_GetDragImage
ImageList_SetFlags
ImageList_SetOverlayImage
ImageList_EndDrag
CreatePropertySheetPageA
InitCommonControlsEx
DrawInsert
Sections
.text Size: 217KB - Virtual size: 217KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 217KB - Virtual size: 240KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ