e:\gyz.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8b9765fda8583054cac44e316ef5090f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8b9765fda8583054cac44e316ef5090f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8b9765fda8583054cac44e316ef5090f_JaffaCakes118
-
Size
480KB
-
MD5
8b9765fda8583054cac44e316ef5090f
-
SHA1
cf4af68a2f321969c56b5fd26a2a09c542d6d7b1
-
SHA256
737186dade67e58731b346520e50e84ecc2f3dc3d8a6219ac65438d860a9af44
-
SHA512
8a4a310e8de0ddde45775977e1e5d6e55c60c3ca09011fa238badef37bb34fcb58882ece3e28913c068b499177c779f8aad902b87f4a673077d3ccdc4fe8558e
-
SSDEEP
6144:p0M5MTMSu8breyWVeYsktK/x024BOPlfFTP4DCQ1dKb9z9CaWJhJ++tx6eZ6IGhx:feu8Gy+eV/t9pU/1Y9zVMcS6eZmzt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b9765fda8583054cac44e316ef5090f_JaffaCakes118
Files
-
8b9765fda8583054cac44e316ef5090f_JaffaCakes118.exe windows:4 windows x86 arch:x86
e6475e440173d1abe447da62c2d7e063
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
winspool.drv
DocumentPropertiesA
ClosePrinter
ord204
kernel32
DeleteCriticalSection
GetCurrentProcessId
GetCPInfo
QueryPerformanceCounter
GetModuleHandleA
Sleep
HeapCreate
HeapFree
SetHandleCount
LCMapStringW
SetStdHandle
GetCommandLineW
WideCharToMultiByte
InterlockedDecrement
GetModuleFileNameW
LeaveCriticalSection
CreateMutexW
EnterCriticalSection
LoadLibraryW
GetLocaleInfoA
GetStdHandle
HeapAlloc
GetProcessHeap
TlsGetValue
GetEnvironmentStrings
VirtualFree
GetCurrentThreadId
GetStringTypeA
GetFileType
GetModuleHandleW
CompareStringW
GetConsoleCP
GetLastError
SetFilePointer
WriteConsoleA
GetStartupInfoA
RtlUnwind
InterlockedExchange
GetSystemTimeAsFileTime
HeapReAlloc
GetTickCount
TerminateProcess
GetConsoleMode
GetCommandLineA
ExitProcess
InitializeCriticalSection
MultiByteToWideChar
LCMapStringA
LoadLibraryA
FreeEnvironmentStringsW
GetTimeZoneInformation
GetDateFormatA
TlsAlloc
SetLastError
HeapDestroy
RaiseException
SetEnvironmentVariableA
InterlockedIncrement
WriteConsoleW
TlsSetValue
GetCurrentProcess
HeapSize
CreateFileA
GetEnvironmentStringsW
GetModuleFileNameA
UnhandledExceptionFilter
GetStartupInfoW
GetACP
VirtualAlloc
FlushFileBuffers
ReadFile
SetUnhandledExceptionFilter
CompareStringA
VirtualQuery
GetConsoleOutputCP
GetStringTypeW
CloseHandle
GetVersionExA
WriteFile
TlsFree
FreeEnvironmentStringsA
GetTimeFormatA
GetOEMCP
IsValidCodePage
IsDebuggerPresent
GetProcAddress
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteExA
gdi32
StartDocA
GetWindowExtEx
ExcludeClipRect
GetPixel
SetPaletteEntries
MaskBlt
SetViewportOrgEx
ExtFloodFill
SetPolyFillMode
RectInRegion
EndPage
FrameRgn
GetDCOrgEx
StartPage
GetTextExtentPoint32A
ResizePalette
GetViewportOrgEx
RestoreDC
RoundRect
CreateSolidBrush
PolylineTo
SetBrushOrgEx
SaveDC
CreateDIBitmap
GetViewportExtEx
Arc
GetClipBox
PatBlt
SetBkColor
CreatePen
GetRegionData
GetNearestPaletteIndex
Escape
GetPath
SetROP2
CreateFontIndirectA
CreatePolygonRgn
Polyline
Chord
FlattenPath
StrokeAndFillPath
SelectClipPath
SetBoundsRect
GetCharWidthA
GetPolyFillMode
GetWindowOrgEx
OffsetClipRgn
SetArcDirection
GetPaletteEntries
RealizePalette
DeleteObject
RectVisible
SetTextColor
CopyMetaFileA
CreateCompatibleDC
FillPath
GetStockObject
GetTextMetricsA
SetWindowOrgEx
GetMapMode
EndDoc
ResetDCA
SetPixel
UpdateColors
SetBitmapBits
CloseEnhMetaFile
AbortDoc
GetCharABCWidthsA
GetTextExtentPointA
IntersectClipRect
OffsetRgn
CreateEnhMetaFileA
GetTextCharacterExtra
SelectObject
TextOutA
GetCurrentPositionEx
LineTo
MoveToEx
GetDeviceCaps
SetStretchBltMode
OffsetViewportOrgEx
SetTextAlign
Pie
OffsetWindowOrgEx
Ellipse
FloodFill
SetBkMode
BitBlt
Polygon
CreatePatternBrush
SetWindowExtEx
LPtoDP
CreateRectRgn
GetStretchBltMode
SetTextJustification
CreateFontA
CreateBitmapIndirect
GetOutlineTextMetricsA
GetObjectA
GetBoundsRect
advapi32
OpenProcessToken
RegEnumKeyA
GetSidSubAuthority
OpenSCManagerA
RegCreateKeyA
OpenServiceA
RegEnumValueA
user32
DefFrameProcW
CheckMenuItem
SetMenu
RegisterClassW
GetWindowPlacement
GetDlgItem
SetCapture
CloseClipboard
BeginDeferWindowPos
ValidateRect
FillRect
ClientToScreen
DestroyIcon
IsRectEmpty
MessageBoxW
UnhookWindowsHookEx
PeekMessageW
RedrawWindow
UnregisterClassW
IsChild
SendMessageA
DispatchMessageW
LoadMenuW
DeferWindowPos
DrawStateW
GetMenuItemID
SetWindowPlacement
ReleaseDC
MessageBoxA
CreateWindowExW
SetRect
DrawTextW
BringWindowToTop
DeleteMenu
LoadStringW
SetTimer
EnumWindows
GetSystemMetrics
EmptyClipboard
IsIconic
OffsetRect
AdjustWindowRectEx
MapWindowPoints
FindWindowW
EnableMenuItem
GetIconInfo
DestroyWindow
RegisterClassExW
EndDeferWindowPos
ScrollWindow
GetSysColor
InvalidateRect
DestroyCaret
GetWindow
GetDlgCtrlID
RegisterClipboardFormatW
DrawIconEx
InsertMenuW
DrawIcon
IntersectRect
SetWindowPos
SetDlgItemInt
LoadIconW
MessageBeep
IsWindow
SetFocus
DestroyAcceleratorTable
LoadImageW
SetMenuItemInfoW
IsDlgButtonChecked
GetCursorPos
LoadCursorW
SetScrollInfo
PtInRect
IsMenu
TrackPopupMenu
TranslateMessage
GetScrollInfo
SetForegroundWindow
SetWindowTextW
GetMenu
InflateRect
DefWindowProcW
SendMessageW
GetClientRect
GetDC
SystemParametersInfoA
GetWindowRect
DestroyMenu
IsZoomed
EndDialog
SetCursor
KillTimer
DrawFrameControl
CallNextHookEx
GetWindowLongW
ScreenToClient
GetNextDlgTabItem
GetMessageW
SystemParametersInfoW
WindowFromPoint
ShowWindow
CallWindowProcW
comctl32
ImageList_GetImageCount
ImageList_Add
InitCommonControlsEx
oleaut32
LoadTypeLi
Sections
.text Size: 116KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 268KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ