N:\kSYZdegN\aIjFHfnbjD\rOyNcHwYzhqMu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
93d78dd82ab38e538fbfc194a04eb882_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
93d78dd82ab38e538fbfc194a04eb882_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
93d78dd82ab38e538fbfc194a04eb882_JaffaCakes118
-
Size
147KB
-
MD5
93d78dd82ab38e538fbfc194a04eb882
-
SHA1
bbe00f96f0eab8547424840c4fddd2e23875c7af
-
SHA256
9af8a455f07b5afcc4bc757d2b88a7cba95c2fafcd147e661723c536b737e091
-
SHA512
9b2eed8e445d8c67e6857e52d241ce1ae01e1142e4b0642281825e201de8d0d0e48ef7d164ad75b860c8364514e87922828937eaecc6dac53bbc5e31c69fb00c
-
SSDEEP
3072:UMYL+vqbDJSTVW4QfuqY4n4uVy3iQGO/xyVTm/iFA:UhL21Tamf448tm/WA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 93d78dd82ab38e538fbfc194a04eb882_JaffaCakes118
Files
-
93d78dd82ab38e538fbfc194a04eb882_JaffaCakes118.exe windows:5 windows x86 arch:x86
8e74a47d9cd7f4348a3a9f38969cd0f5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
EndPath
GetROP2
SelectObject
StartPage
CreateFontIndirectW
Rectangle
SetBitmapDimensionEx
SaveDC
CreateDIBSection
OffsetRgn
GetNearestColor
GetClipBox
PtInRegion
GetLayout
GetTextExtentPointA
GetFontData
StartDocW
GetObjectA
CombineRgn
SetDIBColorTable
ResizePalette
SetDIBitsToDevice
CreateFontA
GetCharWidth32W
SetViewportOrgEx
ExtTextOutA
SetRectRgn
DPtoLP
CreateBrushIndirect
SetPaletteEntries
CreatePolygonRgn
SelectPalette
TranslateCharsetInfo
CreateDCW
CreatePatternBrush
GetTextColor
TextOutA
CreateBitmapIndirect
CreateCompatibleDC
Polyline
PathToRegion
GetTextExtentExPointW
LPtoDP
GetTextMetricsA
PolyBezier
SetBkMode
CreateFontIndirectA
Escape
EndPage
SetBrushOrgEx
kernel32
WinExec
GetCurrentDirectoryW
HeapAlloc
GetDateFormatA
CreateDirectoryW
LCMapStringW
LocalLock
HeapWalk
GetModuleHandleA
WriteFile
GetVersionExA
InitializeCriticalSection
OpenSemaphoreW
LocalFree
GetExitCodeThread
RegisterWaitForSingleObject
TerminateThread
WaitForMultipleObjects
ReadFile
GetWindowsDirectoryA
SetCurrentDirectoryA
GetLastError
LoadLibraryW
FileTimeToLocalFileTime
PulseEvent
FindClose
OpenEventW
GetFileSize
CreateWaitableTimerA
GetCommConfig
CreateEventW
SystemTimeToFileTime
GetStartupInfoA
GetStartupInfoW
GetModuleFileNameW
GlobalCompact
GlobalGetAtomNameW
RemoveDirectoryW
SearchPathW
GetThreadPriority
ResumeThread
SetHandleCount
GetTimeFormatA
GetStdHandle
GetHandleInformation
LockFile
OpenFileMappingW
CreateNamedPipeA
CreateWaitableTimerW
MulDiv
CreateMutexA
ClearCommBreak
Sleep
LoadLibraryExW
FreeResource
GetComputerNameExW
lstrlenA
msvcrt
fread
isxdigit
wcstod
towupper
iswctype
isalnum
_controlfp
__set_app_type
__p__fmode
__p__commode
strrchr
bsearch
vswprintf
_amsg_exit
islower
putchar
_initterm
wcspbrk
strncmp
_acmdln
rand
exit
_ismbblead
strcspn
_XcptFilter
_exit
iswalpha
strtoul
mbstowcs
strchr
_cexit
iswxdigit
malloc
wcsncmp
__setusermatherr
free
isupper
isalpha
isprint
__getmainargs
localtime
isspace
tolower
calloc
toupper
vsprintf
iswdigit
wcscpy
fputc
user32
GetNextDlgGroupItem
LoadStringA
GetUpdateRgn
OpenDesktopW
CheckRadioButton
GetSystemMetrics
GetKeyboardType
SetWindowPos
RegisterHotKey
TranslateAcceleratorW
keybd_event
InvalidateRgn
LoadBitmapW
GrayStringW
CreateCaret
RegisterWindowMessageA
ShowCursor
GetClassInfoExA
CreateIconFromResource
TrackPopupMenu
GetClientRect
wsprintfW
GetClassInfoW
GetNextDlgTabItem
InflateRect
EnableWindow
FindWindowExW
ChangeMenuW
ArrangeIconicWindows
RegisterWindowMessageW
CloseDesktop
LoadAcceleratorsW
ShowScrollBar
GetScrollRange
DestroyCaret
GetSystemMenu
MonitorFromPoint
CheckMenuItem
GetWindowTextW
AttachThreadInput
SetMenuItemInfoW
CheckMenuRadioItem
GetSubMenu
ClipCursor
IsCharAlphaW
LoadIconA
MapVirtualKeyExW
MapWindowPoints
RegisterClassExW
FindWindowA
BeginDeferWindowPos
LoadMenuA
GetAsyncKeyState
GetMessageTime
OpenIcon
SetWindowLongA
SetSysColors
SetActiveWindow
IsWindow
SystemParametersInfoA
SendNotifyMessageW
GetClassInfoExW
VkKeyScanW
IsWindowEnabled
GetDlgItemTextA
ShowCaret
DestroyAcceleratorTable
CharUpperBuffA
DrawIcon
HiliteMenuItem
GetAltTabInfoW
GetForegroundWindow
GetMenuItemID
SetScrollPos
SetScrollInfo
GetClassNameW
DrawMenuBar
GetActiveWindow
SetWindowPlacement
GetKeyboardLayoutNameW
GetDC
CreateMenu
RemovePropW
OffsetRect
ReleaseDC
SetDlgItemInt
DefDlgProcA
GetClassLongW
DestroyWindow
GetWindowPlacement
SetMenu
ModifyMenuW
GetFocus
SetMenuItemBitmaps
FillRect
GetKeyState
MessageBoxExA
GetWindowDC
UpdateWindow
MapVirtualKeyA
CharNextA
RegisterClassA
EnumWindows
DestroyIcon
KillTimer
IsChild
LoadAcceleratorsA
AdjustWindowRect
AdjustWindowRectEx
InSendMessageEx
GetWindowTextA
GetMenuItemRect
DragObject
GetDlgCtrlID
DefWindowProcW
SetDlgItemTextA
EndDialog
LoadMenuW
GetCursorPos
mouse_event
DrawStateA
Exports
Exports
?LoadProfileExW@@YGDF]A
?BitCounterArrayIdeDunAs@@YGKGE@Z
?ShowVersionNew@@YG_NMJKPAN]A
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ