h:\eol\treuxeymz.PDB
Static task
static1
Behavioral task
behavioral1
Sample
94738b16b39331736ad566ffb6cd4c6a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
94738b16b39331736ad566ffb6cd4c6a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
94738b16b39331736ad566ffb6cd4c6a_JaffaCakes118
-
Size
600KB
-
MD5
94738b16b39331736ad566ffb6cd4c6a
-
SHA1
fcfe7d07a55c03ef404306c2f5197e09a3d21833
-
SHA256
a59aef54d36cba474e4c2305aa359215cc53ede99bdcb08e66cac83d7d2da116
-
SHA512
e4e3f4175be0a7b714f57609c3c333869c8ae7fed70776def3bfb192ca5c25154f6fbf772bfe570c6b060b0b2e6618a39b2c608913bb8c3965e1f4e34ddf6dec
-
SSDEEP
12288:+hKOV75e14MM9B9KkPCmE+oZCFbh93YNvp:+0O95e1cWkPC1+ochh9Ir
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 94738b16b39331736ad566ffb6cd4c6a_JaffaCakes118
Files
-
94738b16b39331736ad566ffb6cd4c6a_JaffaCakes118.exe windows:4 windows x86 arch:x86
d32e89751d8caeace3038fb95ae733b9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
CryptGenRandom
CryptSetProviderW
CryptReleaseContext
RegQueryMultipleValuesW
LogonUserW
user32
MessageBoxExA
FindWindowW
LoadAcceleratorsW
CreateDialogIndirectParamA
BroadcastSystemMessageW
IsMenu
GetCapture
DdeQueryStringA
EndTask
CallMsgFilter
CountClipboardFormats
OpenDesktopA
DestroyWindow
DefMDIChildProcA
CharToOemW
ReleaseDC
SetCursorPos
DefWindowProcA
OemToCharW
DeferWindowPos
GetMenuStringW
MessageBoxA
CreateDialogIndirectParamW
GetPropA
DrawFrame
SetProcessWindowStation
LoadImageA
GetWindowTextLengthA
GetNextDlgTabItem
DrawCaption
CharUpperA
SetUserObjectInformationW
AppendMenuW
CharLowerA
ReuseDDElParam
GetClassInfoExA
GetScrollRange
DdePostAdvise
EndDeferWindowPos
RegisterClassExA
RegisterHotKey
SetMenuItemInfoW
SetWindowsHookExW
GetWindow
OpenWindowStationW
DdeConnectList
RegisterClassA
GetWindowLongW
SetDlgItemTextA
CallMsgFilterA
SetWindowPlacement
CreateMenu
AttachThreadInput
CharLowerBuffA
GetCursorInfo
InsertMenuW
SetUserObjectSecurity
DdeQueryNextServer
BroadcastSystemMessage
AnyPopup
DrawMenuBar
IsCharAlphaA
GetSysColor
DlgDirListComboBoxW
CreateWindowExA
GetClassNameW
AdjustWindowRect
ShowWindow
kernel32
LockFile
InterlockedIncrement
lstrlenA
GetSystemTime
TerminateProcess
TransactNamedPipe
HeapDestroy
CreateMutexA
InitializeCriticalSection
CreateSemaphoreW
FreeEnvironmentStringsW
EnumSystemLocalesW
SetConsoleMode
GetTickCount
CreateMutexW
EnumTimeFormatsW
LoadLibraryExA
HeapSize
GetThreadSelectorEntry
GetCurrentProcess
GetProcessHeap
WritePrivateProfileStringW
GetEnvironmentStrings
GetFileType
DeleteFiber
GetLastError
GetVersionExA
WriteFile
IsValidLocale
VirtualFree
SetLastError
OpenMutexA
EnumSystemLocalesA
FreeEnvironmentStringsA
EnumTimeFormatsA
WideCharToMultiByte
GetCommandLineW
GlobalAlloc
SetEnvironmentVariableA
TlsAlloc
SetUnhandledExceptionFilter
GetVersion
TlsFree
GlobalUnfix
CreateToolhelp32Snapshot
DeleteCriticalSection
GetModuleHandleA
GetEnvironmentStringsW
SetLocaleInfoW
GetNamedPipeHandleStateW
VirtualQuery
MultiByteToWideChar
GetWindowsDirectoryA
GetModuleFileNameA
CreateFileA
GetLongPathNameA
GetLocaleInfoA
HeapFree
ExitProcess
WaitNamedPipeW
GetPrivateProfileSectionNamesW
LCMapStringA
UnhandledExceptionFilter
GetCurrentThreadId
HeapCreate
LocalFlags
AllocConsole
GetStringTypeA
GlobalSize
GetComputerNameA
GetCurrentProcessId
CompareStringA
WriteConsoleOutputW
SetConsoleCtrlHandler
ExpandEnvironmentStringsW
RtlUnwind
CloseHandle
LoadLibraryA
GetTimeZoneInformation
GetPrivateProfileIntW
QueryPerformanceCounter
GetCPInfo
CompareStringW
FindNextFileA
GetSystemTimeAdjustment
GetWindowsDirectoryW
SetFilePointer
SetStdHandle
GetConsoleTitleW
WriteConsoleW
CreateProcessA
SetHandleCount
GetProcAddress
GetCurrentThread
GetLocaleInfoW
FindNextChangeNotification
LeaveCriticalSection
InterlockedDecrement
GetConsoleMode
LocalSize
TlsGetValue
GetModuleFileNameW
HeapReAlloc
InterlockedExchange
GetDateFormatA
GetNumberFormatA
GetConsoleOutputCP
CreateRemoteThread
FindResourceExA
FreeLibrary
GetStringTypeExW
FlushFileBuffers
GetStdHandle
EnterCriticalSection
IsValidCodePage
GetConsoleCP
CreateFileMappingA
GetThreadTimes
GetStringTypeExA
ReadFile
lstrcmpA
IsDebuggerPresent
ResumeThread
Sleep
VirtualAlloc
GetStartupInfoW
GetTimeFormatA
LCMapStringW
FindAtomW
HeapAlloc
GetFullPathNameW
GetUserDefaultLCID
GetOEMCP
WriteConsoleA
TlsSetValue
GetStringTypeW
AddAtomA
GetModuleHandleW
GetCommandLineA
GetSystemTimeAsFileTime
GetStartupInfoA
GetACP
shell32
DoEnvironmentSubstW
comdlg32
ReplaceTextW
FindTextW
comctl32
_TrackMouseEvent
CreatePropertySheetPage
CreateStatusWindowW
ImageList_SetFilter
CreateToolbar
InitMUILanguage
InitCommonControlsEx
ImageList_SetOverlayImage
ImageList_GetImageRect
Sections
.text Size: 200KB - Virtual size: 199KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 255KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ