I:\dSknpymhgfx\mWftqickkdq\BFStoWwTysJ\SsEsJkwsj\RobpPXCLFqjuth.pdb
Static task
static1
Behavioral task
behavioral1
Sample
962e36a5ce2648bf047e55a11677afdf_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
962e36a5ce2648bf047e55a11677afdf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
962e36a5ce2648bf047e55a11677afdf_JaffaCakes118
-
Size
141KB
-
MD5
962e36a5ce2648bf047e55a11677afdf
-
SHA1
75084255934a229ef96c4a80e57642557d189339
-
SHA256
e26b14a3fa2116bfc4bc5af22c448bc5a2fef28f7b949febe1bdc4f4eef372ff
-
SHA512
451a8ddc72531a8701e805ca7b104024c820840675f4c7e804a9cc4b72608daade132baadb9df97279b2cf59378de1841b48e4b18efb21a2d4cbd0415c16accb
-
SSDEEP
3072:ICG3BO4hXwutPMeD3vf+9kbKd2AOS29u4t8a+/ojCO1ayI16lyJoE:F+xEM3H+2Kdev9u49+AjC7y2JJB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 962e36a5ce2648bf047e55a11677afdf_JaffaCakes118
Files
-
962e36a5ce2648bf047e55a11677afdf_JaffaCakes118.exe windows:5 windows x86 arch:x86
e0cd0d37cd99ec885a341c30f031f85f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
EndPath
GetROP2
GetWindowOrgEx
StartDocW
GetObjectA
GetSystemPaletteUse
SetLayout
CreatePalette
RectInRegion
OffsetViewportOrgEx
GetFontData
GetViewportOrgEx
TextOutW
shlwapi
StrStrIA
StrTrimA
user32
InSendMessage
DefFrameProcA
SetClassLongW
UpdateWindow
DialogBoxIndirectParamA
CharUpperBuffA
LoadImageW
GetScrollRange
SetDlgItemTextA
DialogBoxParamA
SetFocus
CharLowerA
GetMenuStringW
RegisterHotKey
DestroyMenu
LoadImageA
GetMenuItemCount
VkKeyScanA
GetDlgItemTextA
SetMenu
TranslateMessage
DestroyCursor
IsCharAlphaA
DrawIcon
CharUpperA
LoadMenuA
GetSystemMetrics
InsertMenuW
CharToOemA
comdlg32
PrintDlgExW
ChooseColorW
kernel32
IsDBCSLeadByteEx
GetProcessHeap
GetTickCount
CancelIo
GetThreadPriority
SetSystemTimeAdjustment
DeleteFileA
SetLocalTime
GetACP
HeapAlloc
WaitForMultipleObjects
SetThreadAffinityMask
VirtualAlloc
GlobalFree
GetModuleFileNameA
CreateNamedPipeW
GetModuleHandleA
LocalFree
SetupComm
msvcrt
exit
Exports
Exports
?TN_oyABO_Dwlw_cOI@@UGXHPAI@Z
Sections
.text Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 195B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.$debug Size: 512B - Virtual size: 120B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data1 Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data2 Size: 512B - Virtual size: 408B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data3 Size: 512B - Virtual size: 440B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data4 Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ