J:\iwufQRnrY\iHjojrn\UNKSassZFlyqXo\EiogITbD.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8d15a4513f0a2a6912b7034fa2510173_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8d15a4513f0a2a6912b7034fa2510173_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8d15a4513f0a2a6912b7034fa2510173_JaffaCakes118
-
Size
220KB
-
MD5
8d15a4513f0a2a6912b7034fa2510173
-
SHA1
2c61c682f646bf44980c1fdbaa195330d6344ccd
-
SHA256
cfa31dd840befd0452b4fc5795e861eb93b8a6dfcf580c14bfe14b1e22e5e915
-
SHA512
c9a4f71d0db9331e1805c12b2a6ef76e518f234f2b418965fccafc534f07a1889eedd2a94033c84e74778cfafaab09203ca158fde3e2c20631931e3f57dc8997
-
SSDEEP
6144:6CJfFpOYSTaHZGycjmVo02gRWa83l18x95zodHG:dh7SsZ975dRWt3l1qzoBG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8d15a4513f0a2a6912b7034fa2510173_JaffaCakes118
Files
-
8d15a4513f0a2a6912b7034fa2510173_JaffaCakes118.dll windows:5 windows x86 arch:x86
c7dfb994effa74ef23a7289b71233a66
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
user32
OpenIcon
ActivateKeyboardLayout
EndDialog
SendMessageTimeoutW
GetDlgItemTextW
RegisterClassA
EnableScrollBar
GetMenuItemInfoW
UnionRect
CascadeWindows
GetClipCursor
RegisterClassW
IsDialogMessageA
KillTimer
GetWindowTextW
SetDlgItemTextA
SetCaretPos
IsWindowUnicode
CloseDesktop
CreateCaret
ShowWindow
CheckDlgButton
DrawIcon
PostThreadMessageW
SwapMouseButton
GetClassLongW
GetFocus
DialogBoxParamW
GetMenuItemID
ShowScrollBar
PeekMessageA
TrackPopupMenuEx
InvertRect
IsWindow
GetMessageExtraInfo
IsCharUpperA
IsZoomed
InvalidateRect
SetWindowPos
MapVirtualKeyA
SetDlgItemTextW
DispatchMessageA
ChildWindowFromPoint
DialogBoxParamA
CreateMenu
TrackPopupMenu
InflateRect
GetUserObjectInformationA
SetMenuItemBitmaps
MapDialogRect
TranslateAcceleratorA
GetUpdateRect
DispatchMessageW
GetDlgItem
OemToCharBuffA
SendInput
BeginDeferWindowPos
DefWindowProcA
GetWindowTextLengthW
SetSysColors
DestroyAcceleratorTable
GetWindowLongA
LookupIconIdFromDirectory
LoadBitmapW
MapVirtualKeyExW
RedrawWindow
wvsprintfA
PeekMessageW
SetTimer
PostThreadMessageA
GetScrollPos
GetKeyNameTextW
DrawStateW
CreatePopupMenu
GetDlgItemInt
LoadImageW
mouse_event
GetKeyboardLayout
MapWindowPoints
SetRectEmpty
WaitForInputIdle
GetKeyboardLayoutNameW
ReleaseDC
GetDCEx
ShowWindowAsync
FindWindowExA
IsIconic
LoadImageA
GetCursorPos
ShowOwnedPopups
GrayStringW
InSendMessage
CharLowerA
CallWindowProcA
IsWindowVisible
OemToCharA
CheckMenuItem
AppendMenuA
GetSysColorBrush
OpenInputDesktop
GetWindowDC
GetClientRect
SetUserObjectInformationW
SetFocus
GetMenuItemCount
HideCaret
WindowFromPoint
SystemParametersInfoW
GetCaretPos
comctl32
ImageList_ReplaceIcon
CreatePropertySheetPageA
ImageList_GetImageCount
DestroyPropertySheetPage
PropertySheetA
InitCommonControlsEx
kernel32
FileTimeToSystemTime
LoadResource
GetCurrentDirectoryW
GetFileSize
LocalFree
CreateMutexW
DeleteAtom
GetHandleInformation
SetErrorMode
GetBinaryTypeW
SetThreadLocale
GetTempFileNameW
SetCurrentDirectoryW
FlushViewOfFile
SetCommBreak
GlobalGetAtomNameW
GetLocaleInfoW
CreatePipe
OpenEventA
GetLastError
GetSystemInfo
CreateThread
SetSystemTime
WaitForMultipleObjects
GetCommModemStatus
LocalLock
CreateNamedPipeA
HeapFree
CompareStringW
GetThreadLocale
GetDateFormatW
GetCurrentThreadId
CancelWaitableTimer
GetProcessHeap
GetCommandLineW
GetSystemWindowsDirectoryA
CreateNamedPipeW
TransactNamedPipe
HeapAlloc
MoveFileExA
FreeResource
FindNextFileW
WaitForSingleObjectEx
GetSystemTimeAdjustment
CreateWaitableTimerW
GetSystemTimeAsFileTime
GlobalUnlock
VerSetConditionMask
GetComputerNameA
FindResourceA
CreateWaitableTimerA
LCMapStringA
VirtualAlloc
GetModuleHandleW
GlobalMemoryStatusEx
IsBadWritePtr
gdi32
TranslateCharsetInfo
DeleteDC
GetDIBColorTable
CreateDIBSection
GetTextExtentPointW
StartDocW
AddFontResourceW
SaveDC
SetWindowOrgEx
GetRgnBox
GetTextFaceW
CreateDCW
Ellipse
GetCurrentObject
MoveToEx
SetDIBColorTable
SelectPalette
GetObjectW
SelectClipRgn
SetTextAlign
LineTo
ScaleWindowExtEx
SetBkColor
CreateFontIndirectW
GetSystemPaletteEntries
SetLayout
DeleteObject
CreateFontA
ExcludeClipRect
SetTextColor
GetTextCharsetInfo
EndPage
CreateSolidBrush
SetBkMode
SetViewportExtEx
PtInRegion
GetClipBox
SelectObject
OffsetViewportOrgEx
PatBlt
SetBitmapBits
CreateFontIndirectA
PolyBezier
CreatePolygonRgn
comdlg32
CommDlgExtendedError
GetSaveFileNameA
PrintDlgW
ChooseFontW
GetOpenFileNameW
FindTextW
msvcrt
remove
wcstombs
isalpha
_controlfp
clearerr
atol
strchr
__set_app_type
realloc
__p__fmode
qsort
__p__commode
islower
_amsg_exit
_initterm
_acmdln
exit
wcschr
_ismbblead
_XcptFilter
_exit
vswprintf
clock
gets
localtime
perror
sscanf
malloc
_cexit
strcpy
iswdigit
towlower
wcsncpy
putc
__setusermatherr
isxdigit
printf
strncmp
__getmainargs
setvbuf
ungetc
isdigit
gmtime
strspn
fclose
wcsrchr
Exports
Exports
?KillDateTimeExW@@YGPAEGF]A
?EnumPointerEx@@YGMM]A
?FormatWidth@@YGXK]A
?GetKeyboardA@@YGIPA_NPA_N]A
?IsValidSemaphoreEx@@YGMFK]A
?AddArgumentExW@@YGPANPAGDPAHPAD]A
?ValidateModule@@YGFJNIE]A
?PutCharNew@@YGXMG]A
?IncrementScreenNew@@YGG_N]A
?IncrementMediaTypeNew@@YGJPAFFFG]A
?DeleteFile@@YGXKPAIPADD]A
?FindClassExA@@YGXEPAN]A
?IncrementWindowInfoOriginal@@YGPAEFIDF]A
?OnProcessEx@@YG_NMPAEPAHPAD]A
?IsNotSizeExW@@YGPANPA_NNG]A
?InsertPointNew@@YGMPAIPAIPAIPA_N]A
?CancelAppNameOld@@YGEHEH]A
?IncrementEventExA@@YGJI]A
?SendWindow@@YG_NPAKPAHM]A
?GetKeyboardW@@YGEHPAK]A
?CloseMemoryOld@@YGXD]A
?AddFolderPathOriginal@@YGMH]A
?EnumPenExA@@YGXH]A
?DecrementTimerA@@YGNDHPAGPAH]A
?InvalidateMonitorExA@@YGPAFPAKPAIPAEPAI]A
?RtlPointExW@@YGJPAH]A
?SendModuleNew@@YGGE]A
?OnListW@@YGPAXGI]A
?LoadAppNameEx@@YGPAMPADG]A
?ProfileOriginal@@YGPAIPAGPADPAH]A
?CloseSystemOriginal@@YGPAHH]A
?OnTimer@@YGXGE]A
?FreeDeviceNew@@YGPAGMPAN]A
Sections
.text Size: 193KB - Virtual size: 192KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ