f:\aextxkkctw\obyz\dpyo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8e497cd4530d274f2ad052408949ffeb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8e497cd4530d274f2ad052408949ffeb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8e497cd4530d274f2ad052408949ffeb_JaffaCakes118
-
Size
604KB
-
MD5
8e497cd4530d274f2ad052408949ffeb
-
SHA1
7f10b64bea4befc002f5a6680eaf48db477daf5b
-
SHA256
db345758d51013b6ee82cc9553eeb4cf8518fdca9a098890452e4fa396097a40
-
SHA512
3da132d1d8ac9f5617ca6893dafa8af042341277e546739caf6cecb3b5c4705335cec29413187e3d1b15039c3152d0ec651a4a9b04955f79b9efa15df0265185
-
SSDEEP
12288:hyGNdnMFuPR0wi1nd0bIyMv5VeWisbM2OHO/ZWB3/guAFshtUl0:h7nnvRw1ndBTv5Vek9+cZWBr7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e497cd4530d274f2ad052408949ffeb_JaffaCakes118
Files
-
8e497cd4530d274f2ad052408949ffeb_JaffaCakes118.exe windows:4 windows x86 arch:x86
aff17900b0818fcae79cc7b490cddd29
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
FindExecutableA
FindExecutableW
DoEnvironmentSubstA
SheGetDirA
comctl32
InitCommonControlsEx
DrawInsert
kernel32
GetCurrentProcessId
SetStdHandle
LCMapStringW
GetDiskFreeSpaceExA
HeapFree
lstrcpyn
lstrcmpi
CompareStringA
SetCurrentDirectoryA
SetLastError
GetConsoleCursorInfo
GetThreadTimes
lstrlenA
HeapDestroy
RtlUnwind
FreeEnvironmentStringsA
GetACP
DeleteCriticalSection
SetFileTime
CreateMutexA
GetStringTypeW
LCMapStringA
CreateRemoteThread
LoadLibraryA
SetUnhandledExceptionFilter
ReleaseSemaphore
LocalHandle
GetStartupInfoA
SetHandleCount
EnterCriticalSection
GetTempFileNameA
lstrcatW
TlsAlloc
GetConsoleCP
GlobalLock
GetAtomNameA
TlsSetValue
IsBadWritePtr
FillConsoleOutputCharacterA
GetModuleFileNameA
CompareStringW
FindAtomW
ExitProcess
GetModuleHandleW
SetWaitableTimer
InterlockedExchange
UnhandledExceptionFilter
FreeEnvironmentStringsW
LeaveCriticalSection
GetThreadLocale
EnumTimeFormatsA
GetExitCodeThread
WriteFile
GetStdHandle
SetFilePointer
SetFileAttributesW
TlsGetValue
InitializeCriticalSection
GetLastError
SetEnvironmentVariableA
ReadFile
GetVersion
CreateDirectoryExA
GetFileType
SetEvent
VirtualFree
GetCurrentThreadId
GetTickCount
GetShortPathNameW
GetProcAddress
GetLocalTime
WideCharToMultiByte
GlobalUnfix
VirtualQuery
GetPrivateProfileStructW
SetConsoleCP
WriteFileEx
GetEnvironmentStrings
GetModuleHandleA
GetStringTypeA
FreeLibraryAndExitThread
GetSystemTime
GetTimeZoneInformation
lstrcpy
QueryPerformanceCounter
GetCurrentProcess
GetSystemTimeAsFileTime
MultiByteToWideChar
CloseHandle
TerminateProcess
GetOEMCP
HeapAlloc
HeapReAlloc
HeapCreate
TlsFree
GetEnvironmentStringsW
InterlockedDecrement
GetCommandLineA
InterlockedIncrement
FlushFileBuffers
ReadConsoleOutputCharacterW
CreateToolhelp32Snapshot
GetCurrentThread
VirtualAlloc
GetCPInfo
OpenMutexA
user32
GetInputDesktop
GetQueueStatus
ReleaseCapture
DialogBoxParamA
MapWindowPoints
GetCursorInfo
SetFocus
ChangeDisplaySettingsA
SetWindowWord
CreateWindowExA
SetDeskWallpaper
OpenDesktopA
DestroyWindow
EnumThreadWindows
CreateDialogIndirectParamA
CreateWindowStationA
DdeAbandonTransaction
LoadBitmapA
DdeQueryNextServer
InvalidateRgn
IsCharAlphaA
EnumPropsExW
LookupIconIdFromDirectory
CharToOemBuffW
RegisterClassA
LoadAcceleratorsA
GetPropA
GetTabbedTextExtentW
SetRect
TabbedTextOutA
DdeQueryStringA
CharPrevW
WaitForInputIdle
CharUpperA
DlgDirListA
DefWindowProcW
BringWindowToTop
SetUserObjectInformationA
MessageBoxW
GetUserObjectInformationW
GetWindowThreadProcessId
CreateIconFromResourceEx
MsgWaitForMultipleObjects
BeginPaint
DefDlgProcA
DlgDirListW
ShowCaret
SetDlgItemTextA
EnumWindowStationsA
RegisterWindowMessageW
DialogBoxIndirectParamW
RemovePropA
DlgDirSelectExW
GetMenuItemID
TrackMouseEvent
ShowWindow
GrayStringW
GetWindowPlacement
EnumDesktopWindows
RegisterClassExA
Sections
.text Size: 152KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 248KB - Virtual size: 245KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ