c:\djjcsxvhhr\lnrehstzr\jpafopa\esoo\jkoufzwl.PDB
Static task
static1
Behavioral task
behavioral1
Sample
a05fe339fa686c7722d94e85c7b074de_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a05fe339fa686c7722d94e85c7b074de_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a05fe339fa686c7722d94e85c7b074de_JaffaCakes118
-
Size
584KB
-
MD5
a05fe339fa686c7722d94e85c7b074de
-
SHA1
013db8e85b4cdcb5abd69144f05fd5d972c33e18
-
SHA256
7c2bde8c25a39c553a2b0172a8d6cc58423641b5f962e98e89b14c29f86525d8
-
SHA512
1a92948cd55027bc1b73757d7c3df46cb6fd3eb15a099b257adf1cf8457dbe57ad65617c10b2c7558aceaabe7b37a616fcde8e22cc12eff027e1f94365a4348a
-
SSDEEP
12288:cuvsKBkzgcCTpFHodDKivzwjt3jdtIPZGj8xLOCFWBF4gbrWYOc50:thqz/s60hjdtIxVxLXF64gfp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a05fe339fa686c7722d94e85c7b074de_JaffaCakes118
Files
-
a05fe339fa686c7722d94e85c7b074de_JaffaCakes118.exe windows:4 windows x86 arch:x86
3e1ed262da4b0fce607e5272fa90421b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_LoadImage
GetEffectiveClientRect
DestroyPropertySheetPage
CreatePropertySheetPageW
ImageList_DragLeave
ImageList_DragEnter
DrawStatusText
ImageList_DrawEx
DrawStatusTextW
CreateMappedBitmap
CreateStatusWindowA
ImageList_Write
ImageList_SetFlags
ImageList_Merge
ImageList_Add
ImageList_Copy
ImageList_Create
ImageList_AddIcon
ImageList_GetIcon
ImageList_GetImageInfo
CreateUpDownControl
InitCommonControlsEx
ImageList_Read
user32
CopyRect
GetClipboardFormatNameA
InsertMenuItemA
ChildWindowFromPoint
SetCaretBlinkTime
DefWindowProcW
GetMenuStringA
IsChild
PtInRect
EnumDesktopsW
DdeAbandonTransaction
SetCursorPos
CharToOemBuffW
RegisterClassA
GetForegroundWindow
ToUnicodeEx
ExcludeUpdateRgn
GrayStringW
SetProcessDefaultLayout
BroadcastSystemMessage
GetClassLongA
MapVirtualKeyExA
GetWindowWord
SetMenu
SetWindowLongW
PostThreadMessageA
SystemParametersInfoA
DeleteMenu
DrawTextW
LoadImageW
GetSystemMenu
IsCharUpperW
SendDlgItemMessageW
DdeUninitialize
DrawTextA
GetClipboardData
GetCursor
SetMenuItemInfoA
GetThreadDesktop
InflateRect
SendInput
IsWindowVisible
EnumDesktopsA
MessageBoxExA
SetWindowWord
LookupIconIdFromDirectory
DefDlgProcW
CloseDesktop
VkKeyScanExW
InternalGetWindowText
GetWindowDC
LoadAcceleratorsA
DrawFrameControl
GetSubMenu
PostQuitMessage
GetUserObjectInformationW
EnumChildWindows
DestroyWindow
CopyAcceleratorTableW
GetWindowTextW
WaitMessage
SetActiveWindow
TrackPopupMenuEx
SetScrollRange
TranslateMDISysAccel
DialogBoxParamA
EnumDisplaySettingsExW
RegisterClassExA
GetClipboardSequenceNumber
GetSysColorBrush
GetMenuItemInfoA
IsWindowEnabled
RedrawWindow
GetScrollPos
GetIconInfo
GetKeyboardLayoutNameA
FindWindowExW
DrawFrame
EnumDisplayDevicesA
EnumWindowStationsW
LockWindowUpdate
CharToOemBuffA
UnpackDDElParam
DdeKeepStringHandle
IsCharUpperA
GetWindowRgn
OemToCharBuffA
SendMessageTimeoutA
SetWinEventHook
EnumDisplaySettingsW
LoadMenuIndirectA
EndDialog
PackDDElParam
SetSysColors
GetPropA
GetProcessDefaultLayout
EnumDisplayMonitors
WINNLSGetIMEHotkey
SetMenuItemBitmaps
kernel32
ExitProcess
GetLastError
GetCurrentProcess
UnhandledExceptionFilter
TerminateThread
TerminateProcess
GetTimeZoneInformation
GetThreadPriority
GetStartupInfoA
UnlockFileEx
GetTickCount
SetCriticalSectionSpinCount
CreateSemaphoreA
GetProcAddress
GetCPInfo
VirtualAlloc
GetModuleHandleW
ReadFile
SetLocaleInfoA
GetTimeFormatA
GetEnvironmentStringsW
MoveFileA
GetCommandLineA
GetLocaleInfoA
TlsAlloc
InitializeCriticalSection
TlsSetValue
MultiByteToWideChar
SetEnvironmentVariableA
DebugActiveProcess
EnumDateFormatsA
GetEnvironmentStrings
WaitForMultipleObjects
SetEvent
CreateProcessA
GetDateFormatA
lstrcmpW
HeapFree
LoadLibraryA
GetPrivateProfileStructA
SetLastError
LeaveCriticalSection
GetShortPathNameW
LCMapStringW
GetNamedPipeHandleStateA
LoadLibraryW
lstrcatA
GetLongPathNameW
SetComputerNameW
RtlUnwind
EnterCriticalSection
MapViewOfFileEx
SetConsoleTitleA
GetProfileIntA
GetModuleHandleA
OpenEventW
lstrcat
GetNamedPipeInfo
CreateEventW
GetConsoleMode
WritePrivateProfileSectionA
GetVersionExA
GetConsoleCP
GetUserDefaultLCID
InterlockedExchange
WriteFile
OpenMutexA
IsValidCodePage
IsValidLocale
TlsFree
GetOEMCP
GetCurrentThread
GetCurrentProcessId
EnumSystemLocalesA
VirtualQuery
GetFileType
GetThreadContext
CompareStringA
CreateMailslotA
LocalSize
TlsGetValue
CloseHandle
SetFilePointer
HeapDestroy
GetStdHandle
GetStringTypeW
CreateMutexA
GlobalAddAtomA
QueryPerformanceCounter
GetSystemInfo
GetFileAttributesW
HeapReAlloc
HeapAlloc
FreeEnvironmentStringsA
GetLocaleInfoW
FlushFileBuffers
VirtualProtect
HeapSize
SetThreadAffinityMask
GetSystemTimeAsFileTime
GetStringTypeA
GetModuleFileNameA
CreateMailslotW
GetSystemTime
IsBadWritePtr
GetCurrentThreadId
EnumResourceTypesA
VirtualFree
SetStdHandle
FreeEnvironmentStringsW
GetWindowsDirectoryW
HeapCreate
GetACP
LockFileEx
SetHandleCount
OpenFileMappingW
LCMapStringA
OpenEventA
WideCharToMultiByte
DeleteCriticalSection
IsBadReadPtr
HeapValidate
CompareStringW
LocalUnlock
Sections
.text Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 254KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ