e:\etsomrtoe\ulyti.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8ad074ffd861992ea9d247395aaccae4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8ad074ffd861992ea9d247395aaccae4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8ad074ffd861992ea9d247395aaccae4_JaffaCakes118
-
Size
664KB
-
MD5
8ad074ffd861992ea9d247395aaccae4
-
SHA1
2029be3eedc18abc091cac4da38baf5706066e7d
-
SHA256
ed9317e70c9a05cda34e49dfd306b3f5b074470a49143194c379012347f3157f
-
SHA512
9a4aa3ec5ad25a741454098891eae630fcfd2250f763d362c1bcab935d11a79091c59507300d712ee902f0e57c584afc8165c24df201cea566fb07c1f3a0b68b
-
SSDEEP
12288:ewSoFZvvsqHZjUGuCD6ZEcpYQI5NIlJhXtznvLWeeVIRD+Qv:OYvfZsCp8RCpyZv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8ad074ffd861992ea9d247395aaccae4_JaffaCakes118
Files
-
8ad074ffd861992ea9d247395aaccae4_JaffaCakes118.exe windows:4 windows x86 arch:x86
e06e5ecb87220af556e18c705d0e6023
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
DdeDisconnectList
DestroyWindow
RegisterClassExA
RegisterClassA
TranslateMessage
DdeAccessData
wininet
GopherGetLocatorTypeA
ReadUrlCacheEntryStream
SetUrlCacheEntryGroupA
FtpGetCurrentDirectoryA
InternetTimeToSystemTimeW
InternetAutodialHangup
UnlockUrlCacheEntryStream
InternetOpenW
shell32
ShellAboutW
ExtractIconExA
ShellExecuteEx
DragAcceptFiles
kernel32
GetEnvironmentStringsW
InterlockedIncrement
AddAtomW
TlsGetValue
LoadLibraryW
GetCurrentThread
OpenMutexA
GetCommandLineA
GetOEMCP
GetFileType
GetDateFormatA
MultiByteToWideChar
InterlockedDecrement
lstrlenA
CompareStringA
EnterCriticalSection
SetThreadLocale
UnhandledExceptionFilter
GetCurrentThreadId
FlushFileBuffers
LoadLibraryA
LCMapStringA
SetEnvironmentVariableA
GetTimeZoneInformation
EnumCalendarInfoExA
GetStartupInfoW
HeapFree
HeapValidate
ExitProcess
HeapCreate
GetCurrentProcessId
VirtualFree
GetConsoleOutputCP
VirtualAlloc
RtlUnwind
IsDebuggerPresent
TerminateProcess
GetCPInfo
HeapAlloc
WriteFile
GetLocaleInfoA
QueryPerformanceCounter
GetStringTypeW
CreateWaitableTimerW
GetPriorityClass
GetCurrentProcess
SetFilePointer
HeapReAlloc
SetStdHandle
FreeEnvironmentStringsW
IsBadReadPtr
WriteConsoleA
GetTickCount
GetStringTypeA
GetModuleFileNameA
GetCommandLineW
VirtualQuery
FlushViewOfFile
CloseHandle
GetModuleFileNameW
CompareStringW
RaiseException
AddAtomA
SetCriticalSectionSpinCount
CreateFileA
GetProcAddress
LeaveCriticalSection
SetConsoleCtrlHandler
IsValidCodePage
LCMapStringW
DebugBreak
GetStdHandle
GetEnvironmentStrings
SetHandleCount
FreeEnvironmentStringsA
GetConsoleMode
GetACP
OutputDebugStringA
GetStartupInfoA
FreeLibrary
GetTimeFormatA
OutputDebugStringW
TlsFree
GetLastError
WriteConsoleW
EnumSystemLocalesA
GetModuleHandleA
GetUserDefaultLCID
TlsSetValue
SetLastError
WideCharToMultiByte
TlsAlloc
CreateMutexA
GetProcessHeap
GetVersionExA
GetLocaleInfoW
HeapDestroy
ReadFile
SetUnhandledExceptionFilter
DeleteCriticalSection
GetSystemTimeAsFileTime
GetConsoleCP
InitializeCriticalSection
InterlockedExchange
IsValidLocale
comctl32
InitCommonControlsEx
Sections
.text Size: 482KB - Virtual size: 482KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 62KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ