Y:\nnyammjqglqI\bugSVgkv\gobzoxW.pdb
Static task
static1
Behavioral task
behavioral1
Sample
954fd87b0b23d9e58fe67ebddcdc857c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
954fd87b0b23d9e58fe67ebddcdc857c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
954fd87b0b23d9e58fe67ebddcdc857c_JaffaCakes118
-
Size
449KB
-
MD5
954fd87b0b23d9e58fe67ebddcdc857c
-
SHA1
1e227d5f69d76b18d86e41751686c104af7888d9
-
SHA256
2e489f865d361135df441d5abf8345110a71216a76a67c5cf427c48564980d14
-
SHA512
9d8fccae560337885106f672544b58db74cde32303c7f5d9eb5ce811d61107d079469d497180d877026a8ffcf1e24263758bd5320804d5d824d7684f80934a10
-
SSDEEP
6144:+aMTiGcwQbnY7/yRc9yhM668lJE0/yIpAAo0z20pQCT1ugECw1zdzLNiSIHRiQwX:+nm7SmYyyHMptJGCpHM1zxVoRiQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 954fd87b0b23d9e58fe67ebddcdc857c_JaffaCakes118
Files
-
954fd87b0b23d9e58fe67ebddcdc857c_JaffaCakes118.exe windows:5 windows x86 arch:x86
c07a2bc5b0cd41edfbb9a91afc267ad7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
GetWindowLongW
PostMessageW
GetMenu
IsCharAlphaW
FindWindowExW
SetClassLongW
GetWindowLongA
AdjustWindowRectEx
UpdateWindow
CheckMenuItem
DrawFrameControl
DrawEdge
CloseDesktop
LoadCursorW
EnumChildWindows
RegisterWindowMessageW
IsDialogMessageW
MapWindowPoints
ExitWindowsEx
CreatePopupMenu
CopyAcceleratorTableW
CharLowerA
SetCaretPos
GetPropW
IsRectEmpty
SetWindowTextA
DispatchMessageW
ShowWindowAsync
SystemParametersInfoA
SetMenuDefaultItem
FindWindowW
LoadAcceleratorsW
VkKeyScanW
MapVirtualKeyA
DrawIconEx
RegisterClassW
GetNextDlgGroupItem
GetClassNameW
CheckRadioButton
DispatchMessageA
LoadStringW
LoadImageW
InvalidateRect
DialogBoxParamW
GetMenuCheckMarkDimensions
GetWindowPlacement
shlwapi
StrDupW
ord157
ole32
OleLockRunning
kernel32
LocalFree
IsBadCodePtr
FindResourceExW
SetFilePointer
DeleteFileA
LeaveCriticalSection
SetErrorMode
GetTimeFormatA
GetSystemDirectoryW
SetUnhandledExceptionFilter
GetCompressedFileSizeW
GetTempPathA
GetModuleFileNameW
GetModuleHandleW
GetWindowsDirectoryA
CreateFileW
GetSystemWindowsDirectoryW
GetCommProperties
CreateEventA
GetStdHandle
SetCommBreak
msvcrt
fseek
_controlfp
wcsncmp
__set_app_type
__p__fmode
strrchr
isalpha
iswprint
mbstowcs
strspn
__p__commode
strcspn
_amsg_exit
fprintf
_initterm
_acmdln
exit
_ismbblead
calloc
_XcptFilter
_exit
strchr
strcoll
time
_cexit
__setusermatherr
__getmainargs
gdi32
GetTextExtentPointW
GetTextAlign
SetStretchBltMode
GetBitmapBits
CreateBitmap
ExtFloodFill
ScaleWindowExtEx
GetObjectA
GetWindowOrgEx
GetPaletteEntries
SetDIBitsToDevice
FillRgn
SetPaletteEntries
SetROP2
GetTextMetricsW
BeginPath
PatBlt
TranslateCharsetInfo
Exports
Exports
?PutTextA@@YGIDNJ*Z
?SendAnchorOld@@YGPANPAMD*Z
?GenerateFileExA@@YGEDGPAE*Z
?CopyTimeW@@YGGG*Z
?RtlAppNameExW@@YGHPAJ*Z
?HeaderExA@@YGPAHPAK*Z
?RemoveFolderPathNew@@YGDFPAJ*Z
?CloseModuleOriginal@@YGIDKD*Z
?DecrementValueExW@@YGXPAJPAG*Z
Sections
.text Size: 421KB - Virtual size: 421KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 512B - Virtual size: 484B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.etdir Size: 512B - Virtual size: 381B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.itdir Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 550KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vtdir Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ptdir Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.stdir Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ