d:\qxd\yptkqnqge.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8d6ad485c3681794f888ceb1b7fcd78d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8d6ad485c3681794f888ceb1b7fcd78d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8d6ad485c3681794f888ceb1b7fcd78d_JaffaCakes118
-
Size
868KB
-
MD5
8d6ad485c3681794f888ceb1b7fcd78d
-
SHA1
41d7e927abb78a8da69685a8715b3b02d71ecb54
-
SHA256
56714538b262d6b4aca1190980bb6fd05a3c9d4796f277f84cee5288605d2878
-
SHA512
17dc7ef3b8bcc96ddee53926bf6feea9d2786db0e71f12b099fe2083e1aa47ac8a5068bf416cb8c1c039ef293d23f5c5e555f8886f3eb51f25b3bc35710a874d
-
SSDEEP
12288:PTjihB+0ltzrtzqeiepNp2MUfW4il4oUGEs+jQQiLaz3cj7CfIDkafXjssGtWj:iH+0ltzrhqly+cSRjQQ5TFmvG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8d6ad485c3681794f888ceb1b7fcd78d_JaffaCakes118
Files
-
8d6ad485c3681794f888ceb1b7fcd78d_JaffaCakes118.exe windows:4 windows x86 arch:x86
b62587e3df7e1c0cb29074deeacf4cec
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
GetMetaFileA
LPtoDP
GetCharWidthW
AngleArc
EnumFontFamiliesExA
CreateEllipticRgn
SetDeviceGammaRamp
OffsetWindowOrgEx
SetBkColor
GetTextFaceA
GetCurrentObject
GetTextColor
SetGraphicsMode
GetGlyphOutlineW
user32
MessageBoxExW
SetLastErrorEx
EnumPropsA
DestroyCursor
EnumWindowStationsW
GetWindowTextLengthW
TrackPopupMenuEx
WINNLSEnableIME
UnregisterClassA
DefWindowProcW
DialogBoxParamW
OemToCharBuffA
MoveWindow
MessageBoxA
SetDlgItemTextW
MessageBoxIndirectW
SetActiveWindow
LoadImageW
GetMenuBarInfo
EnumDisplayDevicesW
GetOpenClipboardWindow
GetKeyboardLayoutList
GetMenuInfo
IsWindowVisible
SetWindowContextHelpId
LoadCursorA
ShowWindow
InvalidateRect
UnhookWindowsHook
SetRectEmpty
DdeKeepStringHandle
IsCharAlphaW
GetThreadDesktop
GetWindowPlacement
DdeCreateDataHandle
TranslateMDISysAccel
CreateWindowExW
EnumDisplaySettingsExA
DestroyWindow
CharNextA
RegisterClassExA
DragObject
GetKeyboardLayoutNameW
RegisterClassA
IsDlgButtonChecked
InternalGetWindowText
EnumDesktopsA
advapi32
CryptDestroyKey
RegSetValueW
CryptGetKeyParam
CryptAcquireContextW
LookupAccountSidA
RegOpenKeyExW
GetUserNameA
CryptEncrypt
RegQueryValueExA
CryptExportKey
CryptSetProviderA
RegOpenKeyA
RegSetValueA
CryptCreateHash
LookupAccountSidW
InitiateSystemShutdownW
CreateServiceW
CryptGenKey
shell32
SHLoadInProc
CommandLineToArgvW
SHGetSpecialFolderPathW
DragAcceptFiles
SheChangeDirA
comctl32
CreateToolbar
CreatePropertySheetPage
ImageList_SetIconSize
ImageList_DrawEx
ImageList_LoadImage
ImageList_Create
InitCommonControlsEx
ImageList_GetBkColor
wininet
RetrieveUrlCacheEntryStreamA
InternetSetOptionA
GopherOpenFileW
InternetTimeFromSystemTimeW
CreateUrlCacheContainerA
FtpFindFirstFileA
SetUrlCacheGroupAttributeW
GopherCreateLocatorA
kernel32
VirtualAlloc
EnterCriticalSection
DeleteCriticalSection
HeapCreate
GetTimeFormatW
FreeEnvironmentStringsW
SetComputerNameW
SetHandleCount
GetCurrentProcess
WriteFile
CreateEventW
FreeLibrary
RtlUnwind
TlsGetValue
GetLocaleInfoW
GetUserDefaultLCID
SetStdHandle
GetTimeFormatA
GetCommandLineA
GetPrivateProfileSectionA
GetStringTypeExA
IsDebuggerPresent
GetEnvironmentStringsW
VirtualFree
InitializeCriticalSection
WriteConsoleA
GetDiskFreeSpaceExA
WaitCommEvent
TlsAlloc
QueryPerformanceCounter
GetConsoleMode
GetACP
GetStdHandle
OutputDebugStringW
WriteConsoleOutputCharacterW
SetEnvironmentVariableW
ReadConsoleOutputW
EnumCalendarInfoExW
GetLocaleInfoA
SetEnvironmentVariableA
GetModuleFileNameA
CompareStringA
AllocConsole
SetFilePointer
GetOEMCP
GetConsoleOutputCP
WriteConsoleInputW
GetCurrentProcessId
GetCurrentThread
WriteConsoleOutputCharacterA
GetStringTypeW
lstrcpynW
GetCPInfo
LCMapStringW
ReadFile
HeapDestroy
TlsSetValue
WriteConsoleW
LockFile
GetTimeZoneInformation
GetEnvironmentStrings
IsValidCodePage
GetAtomNameA
InterlockedExchange
InterlockedDecrement
SetLastError
FindResourceExW
AddAtomW
CreatePipe
ReadConsoleOutputA
WritePrivateProfileStringW
GetStringTypeA
CreateMutexA
ExitProcess
GetSystemTime
MultiByteToWideChar
FlushFileBuffers
lstrcmpW
GetProcessHeap
SetUnhandledExceptionFilter
SleepEx
HeapReAlloc
IsValidLocale
SetFileAttributesA
DeleteFileA
TerminateProcess
DuplicateHandle
GetDateFormatA
GetWindowsDirectoryA
GetPrivateProfileIntA
EnumResourceTypesW
CreateFileA
GetProcessShutdownParameters
GetModuleHandleA
WaitForSingleObjectEx
HeapFree
ExpandEnvironmentStringsW
OutputDebugStringA
LoadLibraryA
HeapAlloc
InterlockedIncrement
GetProcAddress
GetNamedPipeHandleStateW
WriteConsoleInputA
LeaveCriticalSection
GetTickCount
GetConsoleCP
GetCurrentThreadId
SuspendThread
OpenMutexA
GetDriveTypeA
TlsFree
Sleep
CloseHandle
GetSystemDirectoryA
EnumSystemLocalesA
FreeEnvironmentStringsA
ExpandEnvironmentStringsA
GetFileType
HeapSize
GetProcAddress
WaitForSingleObject
LCMapStringA
SetThreadContext
GetFileAttributesExW
GetConsoleScreenBufferInfo
GetSystemTimeAsFileTime
VirtualQuery
CompareStringW
FindNextFileW
SetConsoleCtrlHandler
GetVersionExW
GetVersionExA
GetLastError
CopyFileA
WideCharToMultiByte
UnhandledExceptionFilter
GetStartupInfoA
GlobalFix
GetVolumeInformationA
GetProfileStringA
Sections
.text Size: 380KB - Virtual size: 376KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 244KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 132KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ