K:\oLolIJoxaKHM\iwzdekfpUkMwd\nlzdccaV\kfiocfmAgquGev.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8d3314deac0acb6f42770c54eb3ca449_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8d3314deac0acb6f42770c54eb3ca449_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8d3314deac0acb6f42770c54eb3ca449_JaffaCakes118
-
Size
157KB
-
MD5
8d3314deac0acb6f42770c54eb3ca449
-
SHA1
e4644a696d270cda17d14ae6f23f0258424cc83e
-
SHA256
008d9572dfaf7a8e9107f6bd09085e972dcfb76858e3bfc3b58f52f4d9238cf5
-
SHA512
d449acd5b2e2eb0f1c8c7ba3440a911011190612e55d61b53b6192266cf7d21dca3996b95434debded49db93991a4f170695b42680538f40b451604a33828b8b
-
SSDEEP
3072:ElkgkiwHefk2NfCIG69VUftGt2OuC9WNnaQIesMlgIcI/q4/MPl:EyDiwsdqIHAQf8C0BcI/N/Md
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8d3314deac0acb6f42770c54eb3ca449_JaffaCakes118
Files
-
8d3314deac0acb6f42770c54eb3ca449_JaffaCakes118.exe windows:5 windows x86 arch:x86
137a9b4a6059d8b53e3c9d8dbb713fc9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
CreateRectRgn
GetRgnBox
kernel32
CreateFileMappingW
GlobalMemoryStatusEx
GetModuleFileNameW
GetComputerNameA
EnumResourceNamesW
VirtualProtect
CloseHandle
user32
SetWindowTextW
MonitorFromPoint
DefWindowProcA
GetUpdateRgn
TranslateAcceleratorA
SetMenuDefaultItem
TrackPopupMenuEx
WaitForInputIdle
SetFocus
AdjustWindowRect
EnableMenuItem
IsWindowEnabled
CopyRect
SetRectEmpty
FindWindowExA
ntdll
RtlCompareMemory
Exports
Exports
?TemporaryArrayCre
Sections
.text Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hvb Size: - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ek Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hv Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ